Equational Security Proofs of Oblivious Transfer Protocols.
Baiyu LiDaniele MicciancioPublished in: IACR Cryptol. ePrint Arch. (2016)
Keyphrases
- theorem proving
- equational theories
- security protocols
- theorem prover
- key agreement protocol
- security properties
- communication protocols
- cryptographic protocols
- security issues
- authentication protocol
- key exchange
- security services
- information security
- intrusion detection
- access control
- security policies
- application level
- private information retrieval
- security analysis
- secure multiparty computation
- security requirements
- network security
- key distribution
- key management
- security mechanisms
- statistical databases
- transfer learning
- messages exchanged
- first order logic
- peer to peer
- database
- security level
- horn clauses
- smart card
- mutual authentication
- key establishment