Secure Protocol Transformations.
Yuval IshaiEyal KushilevitzManoj PrabhakaranAmit SahaiChing-Hua YuPublished in: CRYPTO (2) (2016)
Keyphrases
- cryptographic protocols
- covert channel
- authentication protocol
- security protocols
- key distribution
- secure routing
- scalar product
- group communication
- lightweight
- homomorphic encryption
- security analysis
- key agreement protocol
- key exchange protocol
- vertically partitioned data
- privacy preserving
- provably secure
- diffie hellman
- password authentication
- security properties
- multi party
- security requirements
- key management
- secure multi party
- secure multiparty computation
- security model
- blind signature
- smart card
- electronic voting
- mutual authentication
- trusted third party
- secure communication
- rfid systems
- key establishment
- security services
- standard model
- mobile agent system
- public key cryptosystems
- key agreement
- identity management
- tcp ip
- mobile payment
- secret sharing
- data sharing
- privacy protection
- public key
- secret key
- security mechanisms