Login / Signup

Card-Based Cryptographic Protocols with Malicious Players Using Private Operations.

Yoshifumi ManabeHibiki Ono
Published in: New Gener. Comput. (2022)
Keyphrases
  • cryptographic protocols
  • insider attacks
  • private information retrieval
  • standard model
  • security properties
  • authentication protocol
  • smart card
  • game theory
  • privacy preserving
  • security protocols
  • database