Login / Signup
A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design.
Vladimir Kolesnikov
Ahmad-Reza Sadeghi
Thomas Schneider
Published in:
J. Comput. Secur. (2013)
Keyphrases
</>
modular design
special case
cryptographic protocols
lightweight
closely related
key exchange
key agreement protocol
computationally efficient
record linkage
information retrieval
cost effective
authentication protocol
security properties