On the Security of an Unconditionally Secure, Universally Composable Inner Product Protocol.
Babak SiabiMehdi BerenjkoubPublished in: CoRR (2018)
Keyphrases
- cryptographic protocols
- authentication protocol
- security protocols
- key agreement protocol
- security analysis
- secure multiparty computation
- key exchange protocol
- security properties
- security requirements
- mutual authentication
- secure routing
- diffie hellman
- covert channel
- security model
- key agreement
- session key
- rfid systems
- key distribution
- key management
- security services
- provably secure
- privacy preserving
- key exchange
- public key
- security issues
- electronic voting
- ban logic
- semi honest
- cryptographic algorithms
- key establishment
- homomorphic encryption
- security mechanisms
- mobile agent system
- password authentication
- standard model
- formal analysis
- secure communication
- security measures
- digital signature scheme
- group communication
- rfid tags
- smart card
- secret key
- private key
- security level
- encryption scheme
- stream cipher
- authentication scheme
- signature scheme
- access control
- information security
- user authentication
- trusted third party
- high security
- sensitive data
- authentication mechanism
- privacy protection
- security management
- blind signature
- lightweight
- user privacy
- wireless sensor networks
- ad hoc networks
- public key cryptosystem
- hash functions
- vertically partitioned data
- security patterns
- scalar product
- data sharing
- mobile payment
- resource constrained
- elliptic curve