Fast Actively Secure Five-Party Computation with Security Beyond Abort.
Megha ByaliCarmit HazayArpita PatraSwati SinglaPublished in: CCS (2019)
Keyphrases
- secure multi party computation
- scalar product
- privacy preserving
- security issues
- password based authenticated key exchange
- security requirements
- homomorphic encryption
- semi honest
- security measures
- response time
- security level
- security mechanisms
- multi party
- privacy preserving data mining
- security properties
- diffie hellman
- sensitive data
- security management
- data privacy
- vertically partitioned data
- dot product
- information security
- secure multiparty computation
- data security
- data sharing
- cryptographic protocols
- electronic voting
- key exchange protocol
- key agreement protocol
- key exchange
- security architecture
- authentication protocol
- key management
- distributed database systems
- security model
- data encryption
- security analysis
- digital signature scheme
- mobile agent system
- encryption scheme
- security patterns
- stream cipher
- security protocols
- concurrency control
- intrusion detection
- access control
- smart card
- security policies
- digital rights management
- key distribution
- security services