Systematizing Secure Computation
PROCEED Systematizing Secure Computation Protocol Information Form
Sign in to Google to save your progress. Learn more
Paper URL
Paper Title
Authors/Team
Venue
Protocol name / nickname
Note: If a paper has multiple protocols, please submit one form for each.
Adversary
Adversary malicousness
Clear selection
Adversary dynamicity
Clear selection
Max corrupted parties
Clear selection
Security
Security type
If hybrid, select highest
Clear selection
Fairness
Clear selection
Composability
Clear selection
Computational Assumption Type(s)
OWF / TDP / RO / OT / etc.
Specific assumptions
Execution Environment
Setup assumption
Clear selection
Efficiency
Online communication complexity per gate
Clear selection
Preprocessing
in circuit size
Clear selection
If you have performed benchmarks, please provide a brief description
Functionality
Computable functions
Clear selection
Function representation
Clear selection
Further Information / Remarks
Submit
Clear form
Never submit passwords through Google Forms.
This form was created inside of Yale University. Report Abuse