Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation.
Yu Long ChenStefano TessaroPublished in: IACR Cryptol. ePrint Arch. (2022)
Keyphrases
- trade off
- security requirements
- intrusion detection
- security policies
- security level
- access control
- neural network
- computational complexity
- key agreement protocol
- data sets
- key management
- efficient computation
- network security
- information security
- high efficiency
- electronic commerce
- multi objective
- security model
- database systems
- security problems
- secure communication
- information systems