Secure Computation Without Authentication.
Boaz BarakRan CanettiYehuda LindellRafael PassTal RabinPublished in: IACR Cryptol. ePrint Arch. (2007)
Keyphrases
- authentication mechanism
- identity management
- security mechanisms
- data encryption
- user authentication
- authentication protocol
- authentication scheme
- security requirements
- security analysis
- password authentication
- integrity verification
- secure manner
- key distribution
- identity authentication
- secure communication
- factor authentication
- public key infrastructure
- private key
- key management
- resource constrained
- secret key
- key exchange protocol
- lightweight
- key agreement