@dblp

MPC vs. SFE : Unconditional and Computational Security.

, , and . ASIACRYPT, volume 5350 of Lecture Notes in Computer Science, page 1-18. Springer, (2008)

Links and resources

Tags