Cryptographic collusion-resistant protocols for secure sum.
Maede Ashouri-TaloukiAhmad Baraani-DastjerdiPublished in: Int. J. Electron. Secur. Digit. Forensics (2017)
Keyphrases
- cryptographic protocols
- security protocols
- security properties
- key management
- homomorphic encryption
- authentication protocol
- key distribution
- cryptographic algorithms
- security services
- key exchange
- secure communication
- privacy preserving
- digital signature
- security mechanisms
- encryption scheme
- smart card
- key establishment
- encryption key
- standard model
- public key encryption
- security requirements
- stream cipher
- group communication
- objective function
- key agreement protocol
- public key cryptography
- encryption decryption
- diffie hellman
- application level