Black-Box Constructions of Protocols for Secure Computation.
Iftach HaitnerYuval IshaiEyal KushilevitzYehuda LindellErez PetrankPublished in: SIAM J. Comput. (2011)
Keyphrases
- black box
- black boxes
- white box
- security protocols
- cryptographic protocols
- key establishment
- key exchange
- key distribution
- test cases
- multi party
- security analysis
- authentication protocol
- application level
- white box testing
- security properties
- hybrid systems
- key management
- security requirements
- state transition
- integration testing
- database
- relational databases
- data sets