Content deleted Content added
No edit summary |
|||
Line 8:
==Security==
The security of a two-party computation protocol is usually defined through a comparison with an idealised scenario that is secure by definition. The idealised scenario involves a [[Trusted_third_party|trusted party]] that collects the input of the two parties over [[secure
==References==
|