On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions.
Ivan DamgårdJoe KilianLouis SalvailPublished in: EUROCRYPT (1999)
Keyphrases
- random number generator
- information security
- network security
- information assurance
- security issues
- access control
- security policies
- statistical databases
- security requirements
- security level
- intrusion detection
- block cipher
- security problems
- key management
- network management
- data security
- security systems
- data encryption
- security management
- data mining
- protection schemes
- cyber security
- security analysis
- computer security
- sensitive data
- hash functions
- information systems