Cryptology ePrint Archive: Report 2014/936
Available versions in chronological order
20141118:190218 (posted 18-Nov-2014 19:02:18 UTC)
Outsourcing Secure Two-Party Computation as a Black Box
Henry Carter and Benjamin Mood and Patrick Traynor and Kevin Butler
20151007:185151 (posted 07-Oct-2015 18:51:51 UTC)
Outsourcing Secure Two-Party Computation as a Black Box
Henry Carter and Benjamin Mood and Patrick Traynor and Kevin Butler
Original publication (with major differences): Proceedings of the International Conference on Cryptology and Network Security (CANS), 2015
[
Cryptology ePrint archive
]