Cryptology ePrint Archive: Report 2014/936

Available versions in chronological order


Outsourcing Secure Two-Party Computation as a Black Box
Henry Carter and Benjamin Mood and Patrick Traynor and Kevin Butler

Outsourcing Secure Two-Party Computation as a Black Box
Henry Carter and Benjamin Mood and Patrick Traynor and Kevin Butler
Original publication (with major differences): Proceedings of the International Conference on Cryptology and Network Security (CANS), 2015


[ Cryptology ePrint archive ]