Skip to main content

A Simple Protocol for Encryption-Based Circuit Simulation

03 August 1987

New Image

1. Introduction: In a previous paper ([AFK]) we considered the problem of computing with encrypted data, that is, whether a weak player A could obtain from a powerful player B the value f(x) without revealing the data x.