Abstract
The notion of covert security for secure two-party computation serves as a compromise between the traditional semi-honest and malicious security defin......
小提示:本篇文献需要登录阅读全文,点击跳转登录