Separating two-round secure computation from oblivious transfer

Benny Applebaum, Zvika Brakerski, Sanjam Garg, Yuval Ishai, Akshayaram Srinivasan

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

8 Scopus citations

Fingerprint

Dive into the research topics of 'Separating two-round secure computation from oblivious transfer'. Together they form a unique fingerprint.

Computer Science

Mathematics

Engineering