Login / Signup

Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption.

Takuho MitsunagaYoshifumi ManabeTatsuaki Okamoto
Published in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2013)
Keyphrases
  • security properties
  • key exchange
  • cryptographic protocols
  • security analysis
  • security requirements
  • key management
  • mutual authentication
  • differential privacy
  • key distribution
  • provably secure
  • encryption scheme