Login / Signup
Composable Adaptive Secure Protocols Without Setup Under Polytime Assumptions.
Carmit Hazay
Muthuramakrishnan Venkitasubramaniam
Published in:
TCC (B1) (2016)
Keyphrases
</>
cryptographic protocols
authentication protocol
key distribution
security protocols
application level
key exchange
multi party
key establishment
homomorphic encryption
secure multiparty computation
smart card
security issues
security mechanisms
security services
key agreement protocol
mutual authentication