Two-Round Secure MPC from Indistinguishability Obfuscation.
Sanjam GargCraig GentryShai HaleviMariana RaykovaPublished in: TCC (2014)
Keyphrases
- encryption scheme
- block cipher
- security analysis
- reverse engineering
- dynamic model
- static analysis
- control flow
- databases
- unauthorized access
- covert channel
- database views
- authentication scheme
- security mechanisms
- security requirements
- closed loop
- t norm
- user authentication
- malware detection
- key management
- identity management
- anomaly detection