Secure Protocols with Asymmetric Trust.
Ivan DamgårdYvo DesmedtMatthias FitziJesper Buus NielsenPublished in: ASIACRYPT (2007)
Keyphrases
- security services
- security protocols
- cryptographic protocols
- key distribution
- authentication protocol
- key exchange
- security mechanisms
- key agreement protocol
- trusted computing
- key management
- multi party
- personal information
- security properties
- secure multiparty computation
- key establishment
- trust model
- security analysis
- trust relationships
- trusted third party
- public key cryptosystems
- group communication
- application level
- privacy preserving
- diffie hellman
- secure communication
- security requirements
- trust evaluation
- sensitive data
- privacy concerns
- smart card
- homomorphic encryption
- scalar product
- lightweight
- sensor networks