Security Analysis of Polynomial Interpolation-Based Distributed Oblivious Transfer Protocols.
Christian L. F. CorniauxHossein GhodosiPublished in: ICISC (2014)
Keyphrases
- security analysis
- key exchange
- authentication protocol
- security properties
- mutual authentication
- security requirements
- secure electronic
- high security
- smart card
- public key
- distributed systems
- distributed environment
- image encryption
- encryption scheme
- private information retrieval
- elliptic curve cryptography
- computer networks
- lightweight
- peer to peer
- authentication scheme
- key distribution