Secure two-party computation: Difference between revisions

Content deleted Content added
Markulf (talk | contribs)
Markulf (talk | contribs)
Line 9:
==Security==
The security of a two-party computation protocol is usually defined through a comparison with an idealised scenario that is secure by definition. The idealised scenario involves a [[Trusted_third_party|trusted party]] that collects the input of the two parties over [[secure channel]]s and returns the result if non of the parties chooses to abort. The cryptographic two-party computation protocol is secure, if it behaves no worse than this ideal protocol, but without the additional [[trust]] [[assumption]]s. This is usually modeled using a simulator.
 
==See also==
 
* An important primitive in 2PC is [[oblivious transfer]].
 
==References==