Protocols for Collusion-Secure Asymmetric Fingerprinting (Extended Abstract).
Ingrid BiehlBernd MeyerPublished in: STACS (1997)
Keyphrases
- extended abstract
- cryptographic protocols
- key distribution
- security protocols
- key exchange
- authentication protocol
- key agreement protocol
- multi party
- security properties
- key establishment
- application level
- security services
- secure multiparty computation
- public key cryptosystems
- key management
- wireless sensor networks
- diffie hellman
- fault tolerant
- group communication
- scalar product
- lightweight
- authentication scheme
- security analysis
- security mechanisms
- secure communication
- trusted third party
- secret key
- semi honest
- user authentication
- communication protocol
- encryption scheme
- session key
- vertically partitioned data
- homomorphic encryption
- security issues
- smart card
- privacy preserving