Secure Computation using Leaky Correlations (Asymptotically Optimal Constructions)
Alexander R. Block1, Divya Gupta2, Hemanta K. Maji1, Hai H. Nguyen1
1Purdue University, {block9,hmaji,nguye245}@purdue.edu 2Microsoft Research, Banaglore, India, divya.gupta@microsoft.com 1 / 21