Extending Oblivious Transfer Efficiently - or - How to Get Active Security with Constant Cryptographic Overhead.
Enrique LarraiaPublished in: LATINCRYPT (2014)
Keyphrases
- security protocols
- key management
- security properties
- encryption scheme
- encryption decryption
- cryptographic protocols
- information security
- intrusion detection
- smart card
- random number generator
- security threats
- cryptographic algorithms
- security issues
- security requirements
- stream cipher
- security services
- security analysis
- database
- computer security
- access control
- fuzzy vault
- secure communication
- security systems
- authentication protocol
- data security