Card-based protocols for secure ranking computations.
Ken TakashimaYuta AbeTatsuya SasakiDaiki MiyaharaKazumasa ShinagawaTakaaki MizukiHideaki SonePublished in: Theor. Comput. Sci. (2020)
Keyphrases
- secure multi party
- authentication protocol
- smart card
- multi party
- cryptographic protocols
- security protocols
- key distribution
- key exchange
- semi honest
- security properties
- key agreement protocol
- security analysis
- ranking algorithm
- key establishment
- ranking functions
- privacy preserving
- secure multiparty computation
- low cost
- application level
- security services
- rank aggregation
- security mechanisms
- mutual authentication
- learning to rank
- web search
- authentication scheme
- group communication
- sensor networks
- digital signature
- security issues
- link analysis
- private key
- standard model
- pairwise
- encryption scheme
- secret key
- sensitive data
- public key
- fault tolerant
- distributed databases