Paper 2011/560
Randomized Secure Two-Party Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation
Ching-Hua Yu and Bo-Yin Yang
Abstract
When secure arithmetic is required, computation based on secure multiplication (
Metadata
- Available format(s)
-
PDF
- Category
- Applications
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- secure two-party computationrandomized algorithmefficiency
- Contact author(s)
- chinghua yu @ gmail com
- History
- 2011-11-15: revised
- 2011-10-17: received
- See all versions
- Short URL
- https://ia.cr/2011/560
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2011/560, author = {Ching-Hua Yu and Bo-Yin Yang}, title = {Randomized Secure Two-Party Computation for Modular Conversion, Zero Test, Comparison, {MOD} and Exponentiation}, howpublished = {Cryptology {ePrint} Archive, Paper 2011/560}, year = {2011}, url = {https://eprint.iacr.org/2011/560} }