Fast Actively Secure Five-Party Computation with Security Beyond Abort.
Megha ByaliCarmit HazayArpita PatraSwati SinglaPublished in: IACR Cryptol. ePrint Arch. (2019)
Keyphrases
- secure multi party computation
- scalar product
- privacy preserving
- security issues
- password based authenticated key exchange
- security requirements
- privacy preserving data mining
- semi honest
- homomorphic encryption
- security measures
- response time
- key management
- security mechanisms
- vertically partitioned data
- dot product
- security protocols
- data encryption
- data security
- security management
- security level
- distributed database systems
- cryptographic protocols
- security properties
- sensitive data
- security services
- secure multiparty computation
- data privacy
- information security
- key exchange
- authentication mechanism
- stream cipher
- identity management
- digital signature scheme
- multi party
- trusted computing
- access control
- electronic voting
- encryption scheme
- key exchange protocol
- key agreement protocol
- security architecture
- private key
- secure communication
- key distribution
- authentication protocol
- security analysis
- transaction processing
- distributed systems