Practical Frameworks For h-Out-Of-n Oblivious Transfer With Security Against Covert and Malicious Adversaries.
Bing ZengXueming TangPeng XuJiandu JingPublished in: IACR Cryptol. ePrint Arch. (2011)
Keyphrases
- information flow
- access control
- information security
- real world
- malicious users
- malicious attacks
- security issues
- semi honest
- computer security
- intrusion detection
- knowledge transfer
- security policies
- network security
- key management
- privacy preserving
- cryptographic protocols
- social networks
- malicious activities
- insider attacks
- database