Two-Round Multiparty Secure Computation Minimizing Public Key Operations.
Sanjam GargPeihan MiaoAkshayaram SrinivasanPublished in: CRYPTO (3) (2018)
Keyphrases
- multi party
- public key
- security analysis
- privacy preserving
- private key
- digital signature
- public key encryption scheme
- public key cryptography
- public key encryption
- security model
- secret sharing
- homomorphic encryption
- diffie hellman
- secure communication
- message authentication codes
- public key cryptosystem
- image authentication
- authentication scheme
- authentication protocol
- provably secure
- encryption scheme
- secret key
- digital images
- elliptic curve cryptography
- public key infrastructure
- signature scheme
- blind signature
- session key
- partially blind signature scheme
- mental states
- blind signature scheme
- key management
- description language
- software systems
- cca secure
- efficient computation
- ciphertext