Star 0

Abstract

Secure computation protocols with two parties and multiparties are discussed.

Topic 1: Hybrid Publicly Verifiable Computation
Authors: James Alderman, Christian Janson, Carlos Cid and Jason Crampton
Topic 2: Efficient Concurrent Covert Computation of String Equality and Set Intersection
Authors: Chongwon Cho, Dana Dachman-Soled and Stanislaw Jarecki