Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol.
Ivan DamgårdMarcel KellerEnrique LarraiaChristian MilesNigel P. SmartPublished in: SCN (2012)
Keyphrases
- cryptographic algorithms
- security protocols
- cryptographic protocols
- covert channel
- secret key
- key distribution
- authentication protocol
- advanced encryption standard
- scalar product
- key exchange protocol
- vertically partitioned data
- security mechanisms
- security analysis
- secure routing
- key agreement protocol
- privacy preserving
- elliptic curve cryptography
- mutual authentication
- group communication
- diffie hellman
- active learning
- secure multi party
- security services
- rfid systems
- security model
- key establishment
- security properties
- lightweight
- provably secure
- electronic voting
- public key
- security requirements
- private key
- key management
- formal analysis
- blind signature
- biometric data
- secure multiparty computation
- key exchange
- secure communication
- closed loop
- multi party
- security issues
- rfid tags
- smart card
- password authentication
- encryption decryption
- user privacy
- authentication scheme
- elliptic curve
- homomorphic encryption
- method invocation