Two-Party Secure Computation for Any Polynomial Function on Ciphertexts under Different Secret Keys.
Bingbing JiangPublished in: Secur. Commun. Networks (2021)
Keyphrases
- secret key
- authentication scheme
- key agreement
- ciphertext
- key distribution
- secure communication
- stream cipher
- key agreement protocol
- key management
- security level
- diffie hellman
- encryption scheme
- smart card
- pseudorandom
- private key
- authentication protocol
- block cipher
- standard model
- public key
- advanced encryption standard
- cryptographic protocols
- security properties
- hash functions
- key establishment
- security model
- group communication
- security analysis
- encryption decryption
- lightweight