Abstract
A report on private computation using a PEZ dispenser is presented in the article. In contrast to traditional approaches, this method does not require any use of randomness. This method can be used by two or more players to compute a function of their inputs while hiding the values of the inputs from each other.
Original language | English |
---|---|
Pages (from-to) | 69-84 |
Number of pages | 16 |
Journal | Theoretical Computer Science |
Volume | 306 |
Issue number | 1-3 |
DOIs | |
State | Published - 5 Sep 2003 |
Keywords
- Cryptographic protocols
- Mathematical games
- Private computation
ASJC Scopus subject areas
- Theoretical Computer Science
- General Computer Science