next up previous
Next: Lower Bounds for Sampling Up: The Technion Period (1986-94) Previous: Proofs of Computational Ability

Asynchronous Secure Computation

This work extends the definitions and constructions of secure multi-party protocols from the synchronous case to the asynchronous one.


Comments: Authored by M. Ben-Or, R. Canetti and O. Goldreich. Appeared in



Oded Goldreich
2003-07-30