Designing Fully Secure Protocols for Secure Two-Party Computation of Constant-Domain Functions.
Vanesa DazaNikolaos MakriyannisPublished in: IACR Cryptol. ePrint Arch. (2017)
Keyphrases
- key agreement protocol
- privacy preserving
- secure multi party computation
- cryptographic protocols
- authentication protocol
- security protocols
- key distribution
- key exchange
- security services
- security issues
- user authentication
- security properties
- authentication scheme
- security analysis
- application level
- identity management
- homomorphic encryption
- semi honest
- secure multiparty computation
- lightweight
- multi party
- security requirements