Secure Computation Without Authentication.
Boaz BarakRan CanettiYehuda LindellRafael PassTal RabinPublished in: J. Cryptol. (2011)
Keyphrases
- authentication mechanism
- security mechanisms
- authentication protocol
- authentication scheme
- password authentication
- identity management
- user authentication
- security requirements
- security analysis
- data encryption
- factor authentication
- integrity verification
- secure manner
- biometric authentication
- access control
- security issues
- lightweight
- key distribution
- trust relationships
- key exchange
- public key cryptography
- key agreement protocol
- digital signature
- electronic payment
- encryption decryption
- efficient computation
- information sharing
- cloud computing