An Efficient Protocol for Fair Secure Two-Party Computation.
Mehmet S. KirazBerry SchoenmakersPublished in: CT-RSA (2008)
Keyphrases
- secure multi party computation
- scalar product
- key agreement protocol
- privacy preserving
- cryptographic protocols
- semi honest
- covert channel
- authentication protocol
- diffie hellman
- security model
- privacy preserving data mining
- lightweight
- security protocols
- vertically partitioned data
- group communication
- key exchange protocol
- secure routing
- dot product
- provably secure
- authenticated key agreement
- key distribution
- security analysis
- mobile agent system
- password authentication
- key exchange
- private information retrieval
- security issues
- multi party
- wireless sensor networks
- secure communication
- highly efficient
- formal analysis
- key agreement
- standard model
- cryptographic algorithms
- mutual authentication
- blind signature
- secret sharing
- tcp ip