Reverse Firewalls for Adaptively Secure MPC Without Setup.
Suvradip ChakrabortyChaya GaneshMahak PancholiPratik SarkarPublished in: ASIACRYPT (2) (2021)
Keyphrases
- security requirements
- closed loop
- authentication scheme
- dynamic model
- application level
- lightweight
- covert channel
- highly efficient
- security issues
- cryptographic protocols
- identity management
- scalar product
- neural network
- unauthorized access
- security management
- security properties
- multi party
- network security
- smart card
- data mining techniques