Designing Fully Secure Protocols for Secure Two-Party Computation of Constant-Domain Functions.
Vanesa DazaNikolaos MakriyannisPublished in: TCC (1) (2017)
Keyphrases
- key agreement protocol
- cryptographic protocols
- authentication protocol
- key distribution
- security analysis
- security protocols
- security properties
- domain specific
- key exchange
- multi party
- application level
- domain independent
- lightweight
- security services
- key establishment
- group communication
- secure communication
- provably secure
- mutual authentication
- secure multiparty computation
- security issues
- authentication scheme
- database systems
- public key cryptosystems