An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries

Posted by