next up previous
Next: On Completeness and Soundness Up: The Technion Period (1986-94) Previous: Efficient Emulation of Single-Hop

How to Solve any Protocol Problem - An Efficiency Improvement

The main observation is that general secure multi-party computation can be reduced to 1-out-of-2 Oblivious Transfer.


Comments: Authored by O. Goldreich and R. Vainish. Appeared in



Oded Goldreich
2003-07-30