An efficient fair UC-secure protocol for two-party computation.
Ou RuanJing ChenJing ZhouYongquan CuiMingwu ZhangPublished in: Secur. Commun. Networks (2014)
Keyphrases
- secure multi party computation
- scalar product
- key agreement protocol
- privacy preserving
- cryptographic protocols
- semi honest
- covert channel
- authentication protocol
- homomorphic encryption
- lightweight
- security protocols
- vertically partitioned data
- key distribution
- security model
- dot product
- multi party
- security analysis
- group communication
- secure routing
- key establishment
- provably secure
- authenticated key agreement
- secure multi party
- privacy preserving data mining
- blind signature
- electronic voting
- diffie hellman
- mobile agent system
- security properties
- formal analysis
- security requirements
- trusted third party
- cryptographic algorithms
- signature scheme
- data sharing
- highly efficient
- digital signature scheme
- smart card