Content deleted Content added
JumpDiscont (talk | contribs) corrected definition of information-theoretic security |
Repairing links to disambiguation pages - You can help! - Assumption |
||
Line 5:
==Security==
The security of a two-party computation protocol is usually defined through a comparison with an idealised scenario that is secure by definition. The idealised scenario involves a [[Trusted third party|trusted party]] that collects the input of the two parties over [[secure channel]]s and returns the result if none of the parties chooses to abort. The cryptographic two-party computation protocol is secure, if it behaves no worse than this ideal protocol, but without the additional [[trust (social sciences)|trust]] [[:wikt:assumption|assumptions]]
==See also==
|