A Linear-Time 2-Party Secure Merge Protocol.
Brett Hemenway FalkRohit NemaRafail OstrovskyPublished in: IACR Cryptol. ePrint Arch. (2022)
Keyphrases
- multi party
- secure multi party computation
- scalar product
- cryptographic protocols
- covert channel
- privacy preserving
- semi honest
- authentication protocol
- secure multi party
- security protocols
- key distribution
- security analysis
- diffie hellman
- lightweight
- secure routing
- group communication
- key exchange protocol
- password based authenticated key exchange
- vertically partitioned data
- key agreement protocol
- homomorphic encryption
- secure communication
- mutual authentication
- cryptographic algorithms
- smart card
- privacy preserving data mining
- rfid systems
- security properties
- key management
- secret sharing
- password authentication
- key exchange
- provably secure
- electronic voting
- mobile agent system
- secure multiparty computation
- security model
- worst case
- trusted third party
- dot product
- communication protocol
- user privacy
- key establishment
- security requirements
- public key cryptosystems
- secret key