Private computation using a PEZ dispenser

József Balogh, János A. Csirik, Yuval Ishai, Eyal Kushilevitz

Research output: Contribution to journalArticlepeer-review

Abstract

A report on private computation using a PEZ dispenser is presented in the article. In contrast to traditional approaches, this method does not require any use of randomness. This method can be used by two or more players to compute a function of their inputs while hiding the values of the inputs from each other.

Original languageEnglish (US)
Pages (from-to)69-84
Number of pages16
JournalTheoretical Computer Science
Volume306
Issue number1-3
DOIs
StatePublished - Sep 5 2003
Externally publishedYes

Keywords

  • Cryptographic protocols
  • Mathematical games
  • Private computation

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Private computation using a PEZ dispenser'. Together they form a unique fingerprint.

Cite this