A Simple Protocol for Encryption-Based Circuit Simulation
03 August 1987
1. Introduction: In a previous paper ([AFK]) we considered the problem of computing with encrypted data, that is, whether a weak player A could obtain from a powerful player B the value f(x) without revealing the data x.