Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing.
Mihir BellareViet Tung HoangPhillip RogawayPublished in: IACR Cryptol. ePrint Arch. (2012)
Keyphrases
- data encryption
- neural network
- key management
- case study
- highly efficient
- identity management
- group communication
- key distribution
- security protocols
- covert channel
- key exchange
- security management
- authentication scheme
- security level
- real time
- security requirements
- lightweight
- information technology
- databases
- data sets