| Courses Software Training / Animation / Graphic Designing | Locality Vasantha nagar |
The protocol that we propose here computes a parameterized family of functions,
which we call threshold functions, in which the two extreme cases correspond
to the problems of computing the union and intersection of private subsets.
Those are in fact general-purpose protocols that can be used in other contexts
as well. Another problem of secure multiparty computation that we solve
here as part of our discussion is the set inclusion problem; namely, the problem
where Alice holds a private subset of some ground set, and Bob holds anelement in the ground set, and they wish to determine whether Bob’s element is
within Alice’s subset, without revealing to either of them information about the
other party’s input beyond the above described inclusion.www.fu-vision .com
www.fu- craft.com
www.fu-vision animedia.com
contact for more information: 9003206648