A Linear-Time 2-Party Secure Merge Protocol.
Brett Hemenway FalkRohit NemaRafail OstrovskyPublished in: CSCML (2022)
Keyphrases
- secure multi party computation
- scalar product
- multi party
- privacy preserving
- cryptographic protocols
- covert channel
- semi honest
- authentication protocol
- secure multi party
- security protocols
- secure routing
- homomorphic encryption
- vertically partitioned data
- security analysis
- group communication
- lightweight
- privacy preserving data mining
- key exchange protocol
- password based authenticated key exchange
- diffie hellman
- secure multiparty computation
- secret sharing
- key agreement protocol
- worst case
- security requirements
- key distribution
- key exchange
- security model
- cryptographic algorithms
- rfid systems
- trusted third party
- sensitive data
- user privacy
- mutual authentication
- electronic voting
- key establishment
- secure communication
- mobile agent system
- password authentication
- security services
- key agreement
- authentication scheme
- encryption scheme
- mobile payment
- public key
- end to end