Secure Computation Without Authentication.
Boaz BarakRan CanettiYehuda LindellRafael PassTal RabinPublished in: CRYPTO (2005)
Keyphrases
- user authentication
- authentication mechanism
- authentication scheme
- security mechanisms
- security analysis
- integrity verification
- identity management
- factor authentication
- data encryption
- key distribution
- password authentication
- secure manner
- security requirements
- identity authentication
- authentication protocol
- lightweight
- digital signature
- access control
- public key
- biometric authentication
- key management
- encryption scheme
- security services
- secure communication
- electronic payment
- private key
- multi party
- efficient computation
- copyright protection
- trusted platform module
- security model