A secure additive protocol for card players.
Andrés Cordón-FrancoHans van DitmarschDavid Fernández-DuqueJoost J. JoostenFernando Soler-ToscanoPublished in: Australas. J Comb. (2012)
Keyphrases
- cryptographic protocols
- smart card
- authentication protocol
- covert channel
- security analysis
- scalar product
- key distribution
- security protocols
- password authentication
- secure routing
- homomorphic encryption
- mutual authentication
- group communication
- lightweight
- key agreement protocol
- provably secure
- key exchange protocol
- security model
- rfid systems
- multi party
- secure multi party
- key agreement
- vertically partitioned data
- game theory
- security properties
- authentication scheme
- diffie hellman
- key exchange
- mobile agent system
- secure communication
- electronic voting
- privacy preserving
- security requirements
- secure multiparty computation
- trusted third party
- low cost
- cryptographic algorithms
- rfid tags
- secret key
- key management
- digital signature scheme
- encryption scheme
- standard model
- digital signature
- identity management
- security services
- user authentication
- mobile payment
- security mechanisms
- tcp ip
- formal analysis
- signature scheme
- blind signature
- sensor networks