Lower bounds and optimal protocols for three-party secure computation.
Sundara Rajan SShijin RajakrishnanAndrew ThangarajVinod M. PrabhakaranPublished in: ISIT (2016)
Keyphrases
- lower bound
- optimal cost
- upper bound
- worst case
- optimal solution
- cryptographic protocols
- branch and bound
- application level
- multi party
- objective function
- efficient computation
- security protocols
- branch and bound algorithm
- security issues
- key management
- key distribution
- dynamic programming
- security properties
- security services
- wireless sensor networks
- min sum
- key establishment