Secure Computability of Functions in the IT setting with Dishonest Majority and Applications to Long-Term Security.
Robin KünzlerJörn Müller-QuadeDominik RaubPublished in: IACR Cryptol. ePrint Arch. (2008)
Keyphrases
- long term
- security requirements
- security issues
- security mechanisms
- security level
- short term
- key management
- security measures
- security properties
- security analysis
- access control
- security architecture
- security management
- security protocols
- authentication protocol
- cryptographic protocols
- data encryption
- electronic voting
- sensitive data
- key agreement protocol
- encryption scheme
- security services
- information security
- user authentication
- stream cipher
- data security
- network security
- integrity verification
- security model
- identity management
- smart card
- security patterns
- security policies
- key exchange protocol
- authentication scheme
- diffie hellman
- key exchange
- intrusion detection
- authentication mechanism
- key agreement
- secure routing
- previously mentioned
- trusted computing
- public key infrastructure
- key management scheme
- high security
- secure communication
- public key encryption
- electronic payment
- public key cryptography
- user privacy
- privacy preserving
- factor authentication
- encryption algorithm
- digital signature scheme