Login / Signup
Secure Dating with Four or Fewer Cards.
Antonio Marcedone
Zikai Wen
Elaine Shi
Published in:
IACR Cryptol. ePrint Arch. (2015)
Keyphrases
</>
security requirements
key management
covert channel
databases
security analysis
real time
website
highly efficient
encryption scheme
key exchange protocol
scalar product