Actively Private and Correct MPC Scheme in t<n/2 from Passively Secure Schemes with Small Overhead.
Dai IkarashiRyo KikuchiKoki HamadaKoji ChidaPublished in: IACR Cryptol. ePrint Arch. (2014)
Keyphrases
- key management scheme
- public key encryption
- key agreement
- provably secure
- key management
- wireless sensor networks
- authentication scheme
- standard model
- diffie hellman
- graphical password
- control system
- small number
- security analysis
- key distribution
- approximation schemes
- key agreement protocol
- privacy preserving
- dynamic model
- proxy re encryption
- bilinear pairings
- elliptic curve
- prediction scheme
- key exchange
- private key
- protection scheme
- data encryption
- wireless networks
- secret sharing scheme
- authentication mechanism
- encryption key
- closed loop
- private cloud
- protection schemes
- ad hoc networks