Next: On Completeness and Soundness
Up: The Technion Period (1986-94)
Previous: Efficient Emulation of Single-Hop
The main observation is that general secure multi-party
computation can be reduced to 1-out-of-2 Oblivious Transfer.
Comments:
Authored by O. Goldreich and R. Vainish. Appeared in
- Crypto87 (Proceedings),
Lecture Note in Computer Science (293) Springer Verlag,
pp. 73-86, 1988.
Oded Goldreich
2003-07-30