k-out-of-n oblivious transfer protocol with security against malicious adversaries.
Xiaochao WeiQiuliang XuYi TangPublished in: Comput. Syst. Sci. Eng. (2017)
Keyphrases
- semi honest
- privacy preserving
- privacy preserving data mining
- multi party
- cryptographic protocols
- authentication protocol
- security protocols
- malicious attacks
- privacy protection
- security model
- security properties
- communication protocols
- insider attacks
- private information retrieval
- secure multiparty computation
- homomorphic encryption
- lightweight
- malicious activities
- malicious users
- contractual obligations
- mobile payment
- security services
- physical layer
- key distribution
- security analysis
- security requirements
- security issues
- sensitive information
- intrusion detection