2023
DOI: 10.1002/cpe.7923
|View full text |Cite
|
Sign up to set email alerts
|

Post‐quantum secure two‐party computing protocols against malicious adversaries

Yachao Huo,
Zongqu Zhao,
Panke Qin
et al.

Abstract: SummarySecure two‐party computation allows a pair of parties to compute a function together while keeping their inputs private. Ultimately, each party receives only its own correct output. In this paper, a post‐quantum secure two‐party computation protocol is proposed that can be used to effectively block malicious parties. The protocol solves the problems of traditional protocols based on garbled circuits, which are vulnerable to quantum attacks, high communication costs and low computational efficiency. The … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
references
References 29 publications
0
0
0
Order By: Relevance