Skip to main content

A simple protocol for secure circuit evaluation.

01 January 1987

New Image

We present a simple protocol for secure circuit evaluation. In its most basic formulation, the protocol enables two players C and D to cooperate in the computation of f(x) while D conceals her data x from C and C conceals his circuit for f from D.