Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security.
Robin KünzlerJörn Müller-QuadeDominik RaubPublished in: TCC (2009)
Keyphrases
- long term
- security issues
- security requirements
- security level
- security measures
- security mechanisms
- key management
- security management
- data encryption
- security properties
- security analysis
- security protocols
- information security
- short term
- stream cipher
- data security
- public key encryption
- sensitive data
- integrity verification
- electronic voting
- cryptographic protocols
- smart card
- security services
- security architecture
- security model
- key distribution
- security patterns
- key exchange protocol
- authentication mechanism
- key agreement protocol
- identity management
- access control
- user authentication
- authentication protocol
- diffie hellman
- digital signature scheme
- secure routing
- digital rights management
- authentication scheme
- public key cryptosystem
- covert channel
- electronic payment
- intrusion detection
- key agreement
- security policies
- secret key
- provably secure
- key exchange
- high security
- secure communication
- network security
- private key