Equational Security Proofs of Oblivious Transfer Protocols.
Baiyu LiDaniele MicciancioPublished in: Public Key Cryptography (1) (2018)
Keyphrases
- theorem proving
- equational theories
- security protocols
- theorem prover
- key agreement protocol
- security properties
- communication protocols
- cryptographic protocols
- authentication protocol
- security services
- secure multiparty computation
- private information retrieval
- security requirements
- security issues
- intrusion detection
- key establishment
- information security
- statistical databases
- key exchange
- first order logic
- messages exchanged
- database
- privacy preserving
- inference rules
- trusted third party
- security mechanisms
- key distribution
- key management
- secure communication
- resource constrained
- encryption scheme
- transaction processing systems
- elliptic curve
- security analysis