Amanote Research

Amanote Research

    RegisterSign In

Variance: Secure Two-Party Protocol for Solving Yao's Millionaires' Problem in Bitcoin

doi 10.18122/b2cd9k
Full Text
Open PDF
Abstract

Available in full text

Date

Unknown

Authors
Joshua Holmes
Publisher

Boise State University


Related search

Statistical Security Conditions for Two-Party Secure Function Evaluation

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
English

Efficiently Making Secure Two-Party Computation Fair

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2017English

Secure Two-Party Computation Over Unreliable Channels

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2018English

Hiding the Input-Size in Secure Two-Party Computation

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2013English

Towards Characterizing Complete Fairness in Secure Two-Party Computation

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2014English

Secure Equality Testing Protocols in the Two-Party Setting

2018English

Faster Secure Two-Party Computation With Less Memory

2013English

Efficient Secure Two-Party Computation Against Malicious Adversaries

English

Secure Certificateless Two-Party Key Agreement With Short Message

Information Technology and Control
ControlSystems EngineeringComputer Science ApplicationsElectricalElectronic Engineering
2016English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy