Multiparty Computation with Covert Security and Public Verifiability.
Peter SchollMark SimkinLuisa SiniscalchiPublished in: ITC (2022)
Keyphrases
- multi party
- security properties
- information flow
- privacy preserving
- semi honest
- trust relationships
- security issues
- secret sharing
- access control
- turn taking
- human communication
- security requirements
- information security
- network security
- security protocols
- description language
- key management
- search algorithm
- mental states
- security policies
- dynamic programming