Efficient Non-interactive Secure Computation

2017 1:15:31
Synopsis
Suppose that a receiver R wishes to publish an encryption of her secret input x so that every sender S, holding an input y, can ...
Download Options
Choose a download method below. All links open in new tabs.
Service Features Action
Ssvid
MP4 & MP3 • HD Quality • Browser Extension Available
Download
SaveFrom
MP4 & MP3 • HD Quality • Browser Extension Available
Download
Security Notice: These are third-party services. We recommend using antivirus software and being cautious of pop-up ads.