Next: Lower Bounds for Sampling
Up: The Technion Period (1986-94)
Previous: Proofs of Computational Ability
This work extends the definitions and constructions of secure
multi-party protocols from the synchronous case to the asynchronous one.
Comments:
Authored by M. Ben-Or, R. Canetti and O. Goldreich. Appeared in
- Proc. of the 25th STOC, pp. 52-61, 1993.
Oded Goldreich
2003-07-30