Login / Signup
Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption.
Takuho Mitsunaga
Yoshifumi Manabe
Tatsuaki Okamoto
Published in:
IWSEC (2010)
Keyphrases
</>
key exchange
cryptographic protocols
security properties
security analysis
security protocols
databases
key management
mutual authentication
encryption scheme
provably secure
database systems
smart card
privacy protection
differential privacy
authentication protocol
digital signature