%PDF-1.4 % 1 0 obj << /S /GoTo /D (section.1) >> endobj 4 0 obj (Introduction) endobj 5 0 obj << /S /GoTo /D (section.2) >> endobj 8 0 obj (Preliminaries) endobj 9 0 obj << /S /GoTo /D (subsection.2.1) >> endobj 12 0 obj (Definition of Security Against Covert Adversaries) endobj 13 0 obj << /S /GoTo /D (section.3) >> endobj 16 0 obj (The Two Party Case) endobj 17 0 obj << /S /GoTo /D (subsection.3.1) >> endobj 20 0 obj (Efficient Two Party Computation for Covert Adversaries) endobj 21 0 obj << /S /GoTo /D (subsubsection.3.1.1) >> endobj 24 0 obj (Our Protocol) endobj 25 0 obj << /S /GoTo /D (subsection.3.2) >> endobj 28 0 obj (Extension to General Secure Two Party Computation) endobj 29 0 obj << /S /GoTo /D (section.4) >> endobj 32 0 obj (The Multi Party Case) endobj 33 0 obj << /S /GoTo /D (subsection.4.1) >> endobj 36 0 obj (Building Blocks) endobj 37 0 obj << /S /GoTo /D (subsection.4.2) >> endobj 40 0 obj (Main Multiparty Protocol) endobj 41 0 obj << /S /GoTo /D (theo.2) >> endobj 44 0 obj (References) endobj 45 0 obj << /S /GoTo /D (appendix.A) >> endobj 48 0 obj (The Garbling Algorithm) endobj 49 0 obj << /S /GoTo /D (appendix.B) >> endobj 52 0 obj (General Secure Two-Party Computation) endobj 53 0 obj << /S /GoTo /D (appendix.C) >> endobj 56 0 obj (Oblivious Transfer of AL07) endobj 57 0 obj << /S /GoTo /D (appendix.D) >> endobj 60 0 obj (Description of Simulator for the Two-party Protocol) endobj 61 0 obj << /S /GoTo /D (appendix.E) >> endobj 64 0 obj (Analysis of the Multi-Party Protocol \(Theorem 2\)) endobj 65 0 obj << /S /GoTo /D (subsection.E.1) >> endobj 68 0 obj (Details of the Building Blocks) endobj 69 0 obj << /S /GoTo /D (subsection.E.2) >> endobj 72 0 obj (Main Simulation) endobj 73 0 obj << /S /GoTo /D [74 0 R /Fit ] >> endobj 81 0 obj << /Length 2552 /Filter /FlateDecode >> stream xڭXKܶW̑SI%)VERXCXy/pYn.e4F?nL{Ewݾo*E,8L]gaezK(+g}Yp'O>~DL[Ԍn6巽Ni4Q&E;8,ca'#nG$~0r]LLZ8u;$?yjʃw^ $9diEL2I3KƑveUlϳh2+pϭ{D& 57Ӹoÿ́Ep>+K%3&* ©jLhi:*JC'4ud|h2L0Rf?m}tƁ˵m'Q۩ {> 8e# ڜD5*,03q!/Ķ<3L2g+G>-Ϯp[)C%5jb0yk< Tʰ<2"Q(L} cozqRc0֊Vh0^'8˃dZ,m TYمTگ<-0g@9 +![-Ёv~)gddփ ϳ5'꤁K5_Z`[)Te$$5W?pyh8#頃\ɷB̐L_ oF99 2$& ٶU ([qp }GḭlqyC``nz+4FnUL&%N +BŢJ"W3@^lQ2Ev$aP~e!&Aw!;P˜&69k"sl,(lLkܟ\M#;!FGVغ';ތGB;l%d3BV'gb;8ֆi{Kۑa[?m7H`/62p xGn!MU^x[mF#GUd"cl~gtٸxr8iK'?@+QxI1`,אg^`'L-V2ɍݑ ǮÈ"\ka&("=lyvt$= <$Ac {KOo $T :@hOSf999`[ۛM8áb[aLPHv)<1d4 %" q1؝j D<iFYOLpD]K=I^:CoG@:,|I[(0 %שGY P)[!rHCMhKd,liA8O0{ t'Pvé,rҪ( #';gsL>T5#i,շNVV8Q/J. uF;ۅ$ ѓD.:6}qrp!
iisA+Jhe3mM3@t#h&=!g ud6
k>~gE;>PX
hGwJKV
_6 n#c9w@ kȜaR:ri76+I:EPE#~tY Ex.\KK'Хr$QdGTE
7h!Xe؎`oD=NHQGa12EQ g!
Vxð7
To0L ;hf'Qx)bXBHmN#wmD%,]][KVX0(>aN}ic8jϔHx1~th( IA>Zpy`D]ZSJNi4*;s8/4՜ܽgһhc+B/]PBtޡ8AOx{'e͛Z*}(WlC6
x:ƀ^gQo%3wO(h;15>bȓS7ȈzBZKaP
2v r*0sk>dnP"gEw)LYD!NM]CKC6)b*ƚAh"II Pvi:oL]Ӳ$ύA
֫.9fa{VP{ruP0Pv:a[@yX&ZQ4V>T`D`Je3aȃu hMlIw*;>BgA]䚖+q7RdsVԖ3o8`aKoAy3|54u']&2At V1U큲|sEJesF҉w/1A;7:P]( {lYp/*>1gzuNɥHWC&{(9}yb#w ݝJbilfWI
endstream
endobj
74 0 obj <<
/Type /Page
/Contents 81 0 R
/Resources 80 0 R
/MediaBox [0 0 612 792]
/Parent 92 0 R
/Annots [ 75 0 R 76 0 R 77 0 R 78 0 R ]
>> endobj
75 0 obj <<
/Type /Annot
/Subtype /Link
/Border[0 0 1]/H/I/C[0 1 0]
/Rect [307.049 184.843 338.133 194.29]
/A << /S /GoTo /D (cite.Yao86) >>
>> endobj
76 0 obj <<
/Type /Annot
/Subtype /Link
/Border[0 0 1]/H/I/C[0 1 0]
/Rect [343.32 184.843 385.994 194.29]
/A << /S /GoTo /D (cite.GMW87) >>
>> endobj
77 0 obj <<
/Type /Annot
/Subtype /Link
/Border[0 0 1]/H/I/C[0 1 0]
/Rect [391.181 184.843 440.068 194.29]
/A << /S /GoTo /D (cite.BGW88) >>
>> endobj
78 0 obj <<
/Type /Annot
/Subtype /Link
/Border[0 0 1]/H/I/C[0 1 0]
/Rect [445.255 184.843 482.247 194.29]
/A << /S /GoTo /D (cite.CCD88) >>
>> endobj
82 0 obj <<
/D [74 0 R /XYZ 71 721 null]
>> endobj
83 0 obj <<
/D [74 0 R /XYZ 72 720 null]
>> endobj
2 0 obj <<
/D [74 0 R /XYZ 72 253.285 null]
>> endobj
80 0 obj <<
/Font << /F24 84 0 R /F25 85 0 R /F46 86 0 R /F47 87 0 R /F8 88 0 R /F48 89 0 R /F51 90 0 R /F52 91 0 R >>
/ProcSet [ /PDF /Text ]
>> endobj
104 0 obj <<
/Length 3507
/Filter /FlateDecode
>>
stream
xڅZKWLNՊ|ڬc;ފ7J}HH"eO@' =oo!*"y(*1)]Zo1qG*|at3Z=