Fantastic Four: Honest-Majority Four-Party Secure Computation With Malicious Security.
Anders P. K. DalskovDaniel EscuderoMarcel KellerPublished in: IACR Cryptol. ePrint Arch. (2020)
Keyphrases
- semi honest
- secure multi party computation
- multi party
- privacy preserving
- scalar product
- password based authenticated key exchange
- privacy preserving data mining
- security issues
- security requirements
- security mechanisms
- security measures
- security level
- security protocols
- homomorphic encryption
- dot product
- data encryption
- sensitive data
- security management
- trusted third party
- data privacy
- insider attacks
- security services
- secure multiparty computation
- security architecture
- diffie hellman
- key management
- security analysis
- malicious users
- data security
- authentication protocol
- authentication mechanism
- security patterns
- key agreement protocol
- cryptographic protocols
- key exchange
- user authentication
- security properties
- digital signature scheme
- public key encryption
- access control
- stream cipher
- identity management
- digital rights management
- digital signature
- sensitive information
- integrity verification
- mobile agent system