Abstract
A report on private computation using a PEZ dispenser is presented in the article. In contrast to traditional approaches, this method does not require any use of randomness. This method can be used by two or more players to compute a function of their inputs while hiding the values of the inputs from each other.
Original language | English (US) |
---|---|
Pages (from-to) | 69-84 |
Number of pages | 16 |
Journal | Theoretical Computer Science |
Volume | 306 |
Issue number | 1-3 |
DOIs | |
State | Published - Sep 5 2003 |
Externally published | Yes |
Keywords
- Cryptographic protocols
- Mathematical games
- Private computation
ASJC Scopus subject areas
- Theoretical Computer Science
- Computer Science(all)