Proving Correctness and Security of Two-Party Computation Implemented in Java in Presence of a Semi-honest Sender.
Florian BöhlSimon GreinerPatrik ScheideckerPublished in: CANS (2014)
Keyphrases
- semi honest
- privacy preserving
- secure multi party computation
- privacy preserving data mining
- scalar product
- multi party
- secure multi party
- dot product
- java language
- access control
- key agreement protocol
- security model
- set intersection
- java card
- web services
- private information
- information security
- dimensionality reduction
- feature extraction