Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation.
Yu Long ChenStefano TessaroPublished in: ASIACRYPT (2) (2021)
Keyphrases
- trade off
- security issues
- security level
- computational complexity
- key agreement protocol
- intrusion detection
- access control
- information security
- security requirements
- record linkage
- security mechanisms
- computer security
- security model
- security systems
- database systems
- security management
- information assurance
- security threats
- data security
- functional requirements
- smart card