Threshold Computation and Cryptographic Security.
Yenjo HanLane A. HemaspaandraThomas ThieraufPublished in: SIAM J. Comput. (1997)
Keyphrases
- security protocols
- security properties
- key management
- smart card
- encryption decryption
- security requirements
- information security
- cryptographic protocols
- random number generator
- encryption scheme
- security mechanisms
- encryption key
- fuzzy vault
- secure communication
- elliptic curve cryptography
- cryptographic algorithms
- high assurance
- security analysis
- information systems
- threshold selection
- data security
- security problems
- stream cipher
- security systems
- security issues