Bureaucratic protocols for secure two-party sorting, selection, and permuting.
Guan WangTongbo LuoMichael T. GoodrichWenliang DuZutao ZhuPublished in: AsiaCCS (2010)
Keyphrases
- key agreement protocol
- security protocols
- cryptographic protocols
- semi honest
- key distribution
- multi party
- authentication protocol
- key exchange
- privacy preserving
- secure multiparty computation
- group communication
- selection algorithm
- privacy preserving data mining
- application level
- diffie hellman
- fair exchange protocols
- mutual authentication
- authentication scheme