An Efficient Protocol for the Problem of Secure Two-party Vector Dominance.
Yingpeng SangHong ShenZonghua ZhangPublished in: PDCAT (2005)
Keyphrases
- key agreement protocol
- cryptographic protocols
- covert channel
- semi honest
- security protocols
- scalar product
- security model
- lightweight
- security analysis
- key distribution
- key exchange
- dot product
- security properties
- authentication protocol
- group communication
- secure routing
- secure multiparty computation
- privacy preserving
- homomorphic encryption
- secure multi party
- key agreement
- cryptographic algorithms
- authenticated key agreement
- multi party
- diffie hellman
- mutual authentication
- electronic voting
- standard model
- key management
- privacy preserving data mining
- highly efficient
- feature vectors
- trusted third party
- user privacy
- mobile agent system
- security services
- formal analysis
- vector space