Title
Topology-Hiding Computation for Networks with Unknown Delays.
Abstract
Topology-Hiding Computation (THC) allows a set of parties to securely compute a function over an incomplete network without revealing information on the network topology. Since its introduction in TCC’15 by Moran et al., the research on THC has focused on reducing the communication complexity, allowing larger graph classes, and tolerating stronger corruption types.
Year
DOI
Venue
2019
10.1007/978-3-030-45388-6_8
IACR Cryptology ePrint Archive
DocType
Volume
Citations 
Journal
2019
0
PageRank 
References 
Authors
0.34
0
6
Name
Order
Citations
PageRank
Rio LaVigne100.34
Chen-Da Liu Zhang201.35
Ueli Maurer34526505.09
Tal Moran443925.36
Marta Mularczyk500.34
Daniel Tschudi6284.32