Characterizing optimal security and round-complexity for secure OR evaluation.
Amisha JhanjiHemanta K. MajiRaphael Arkady MeyerPublished in: ISIT (2017)
Keyphrases
- security issues
- worst case
- security requirements
- block cipher
- key management
- security mechanisms
- security management
- security level
- security measures
- electronic voting
- digital signature scheme
- security protocols
- cryptographic protocols
- security analysis
- integrity verification
- security properties
- security policies
- trusted computing
- security architecture
- data encryption
- user authentication
- data security
- access control
- secure multiparty computation
- security patterns
- public key encryption
- key agreement protocol
- information security
- key exchange
- high security
- diffie hellman
- mobile agent system
- key distribution
- intrusion detection
- optimal solution
- electronic payment
- rfid systems
- key agreement
- public key cryptosystem
- security model
- previously mentioned
- public key
- password based authenticated key exchange