Two-Round Multiparty Secure Computation Minimizing Public Key Operations.
Sanjam GargPeihan MiaoAkshayaram SrinivasanPublished in: IACR Cryptol. ePrint Arch. (2018)
Keyphrases
- multi party
- public key
- security analysis
- public key encryption scheme
- digital signature
- privacy preserving
- security model
- private key
- public key cryptography
- diffie hellman
- public key encryption
- secret sharing
- authentication scheme
- secure communication
- public key cryptosystem
- message authentication codes
- signature scheme
- image authentication
- authentication protocol
- encryption scheme
- secret key
- session key
- elliptic curve cryptography
- provably secure
- public key infrastructure
- homomorphic encryption
- blind signature
- rfid tags
- elliptic curve
- security issues
- efficient computation
- proxy re encryption
- image processing operations
- ciphertext
- security mechanisms
- key management
- standard model
- mental states