Secure Protocol Transformations.
Yuval IshaiEyal KushilevitzManoj PrabhakaranAmit SahaiChing-Hua YuPublished in: IACR Cryptol. ePrint Arch. (2016)
Keyphrases
- cryptographic protocols
- covert channel
- authentication protocol
- security protocols
- scalar product
- key distribution
- secure routing
- key agreement protocol
- group communication
- homomorphic encryption
- security analysis
- lightweight
- privacy preserving
- diffie hellman
- key exchange protocol
- vertically partitioned data
- session key
- key exchange
- secret key
- cryptographic algorithms
- security properties
- security requirements
- secure communication
- provably secure
- mutual authentication
- security model
- smart card
- multi party
- secure multiparty computation
- password authentication
- secure multi party
- key management
- standard model
- formal analysis
- blind signature
- electronic voting
- public key
- key establishment
- trusted third party
- rfid systems
- user authentication
- tcp ip
- data sharing
- authentication scheme
- semi honest
- digital signature scheme
- key agreement
- mobile agent system
- security services
- communication protocol
- digital signature
- security mechanisms