Login / Signup
Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption.
Takuho Mitsunaga
Yoshifumi Manabe
Tatsuaki Okamoto
Published in:
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2013)
Keyphrases
</>
security properties
key exchange
cryptographic protocols
security analysis
security requirements
key management
mutual authentication
differential privacy
key distribution
provably secure
encryption scheme