New article published in Nature Communications


Cryptographic protocols are the backbone of our information society. In this work, we implement such a protocol which allows two parties Alice and Bob to compute a function together so that even if Alice tries to cheat by deviating from the protocol, she cannot learn Bob’s inputs and vice versa. A famous example of such a scenario is Yao’s […]