Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation.
Sanjam GargAntigoni PolychroniadouPublished in: IACR Cryptol. ePrint Arch. (2014)
Keyphrases
- encryption scheme
- closed loop
- block cipher
- security analysis
- reverse engineering
- dynamic model
- static analysis
- security issues
- unauthorized access
- multi party
- key management
- standard model
- secret key
- covert channel
- database views
- security level
- security protocols
- lightweight
- public key
- security requirements
- data integration