Login / Signup
Practical and Employable Protocols for UC-Secure Circuit Evaluation over ℤn.
Jan Camenisch
Robert R. Enderlein
Victor Shoup
Published in:
ESORICS (2013)
Keyphrases
</>
security protocols
evaluation criteria
key distribution
real world
multi party
key exchange
evaluation model
security issues
authentication protocol
cryptographic protocols
communication protocols
key agreement protocol
delay insensitive