Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol.
Ivan DamgårdMarcel KellerEnrique LarraiaChristian MilesNigel P. SmartPublished in: IACR Cryptol. ePrint Arch. (2012)
Keyphrases
- cryptographic algorithms
- security protocols
- cryptographic protocols
- covert channel
- key distribution
- secret key
- authentication protocol
- advanced encryption standard
- scalar product
- key exchange protocol
- secure routing
- lightweight
- security analysis
- key agreement protocol
- security mechanisms
- password authentication
- group communication
- diffie hellman
- private key
- vertically partitioned data
- homomorphic encryption
- key establishment
- key management
- provably secure
- rfid systems
- privacy preserving
- mutual authentication
- security properties
- active learning
- encryption decryption
- multi party
- security requirements
- key exchange
- secure communication
- block cipher
- electronic voting
- secure multi party
- closed loop
- secure multiparty computation
- wireless sensor networks
- public key
- trusted third party
- security services
- key agreement
- dynamic model
- rfid tags
- user privacy
- biometric data
- authentication scheme
- formal analysis
- encryption algorithm