Integer Polynomial Recovery from Outputs and its Application to Cryptanalysis of a Protocol for Secure Sorting.
Srinivas VivekShyam MurthyDeepak KumaraswamyPublished in: IACR Cryptol. ePrint Arch. (2022)
Keyphrases
- cryptographic protocols
- covert channel
- secret key
- authentication protocol
- key distribution
- secure routing
- security protocols
- diffie hellman
- scalar product
- group communication
- lightweight
- mutual authentication
- key agreement
- homomorphic encryption
- key exchange protocol
- secure communication
- key agreement protocol
- block cipher
- security analysis
- smart card
- privacy preserving
- signature scheme
- authentication scheme
- public key
- hash functions
- vertically partitioned data
- security requirements
- rfid systems
- cryptographic algorithms
- key establishment
- provably secure
- secure multiparty computation
- multi party
- secure multi party
- security properties
- failure recovery
- blind signature
- key management
- electronic voting
- password authentication
- key exchange
- trusted third party
- user privacy
- mobile payment
- wireless medium
- digital signature scheme
- digital signature
- security model
- credit card
- rfid tags
- wireless sensor networks
- scatter search
- formal analysis