<--- Back to Details
First PageDocument Content
Secure multi-party computation / Standard model / Homomorphic encryption / Pseudorandom generator / Cryptographic primitive / Commitment scheme / Information-theoretic security / Goldwasser–Micali cryptosystem / Secret sharing / Cryptography / Cryptographic protocols / Electronic commerce
Date: 2015-04-14 07:10:50
Secure multi-party computation
Standard model
Homomorphic encryption
Pseudorandom generator
Cryptographic primitive
Commitment scheme
Information-theoretic security
Goldwasser–Micali cryptosystem
Secret sharing
Cryptography
Cryptographic protocols
Electronic commerce

Arithmetic Cryptography∗ Benny Applebaum† Jonathan Avron∗ Christina Brzuska‡

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 933,16 KB

Share Document on Facebook

Similar Documents

Information-Theoretic Security Analysis of Physical Uncloneable Functions  c, S. Stallinga, A.H.M. Akkermans, W. Ophey P. Tuyls, B. Skori Philips Research Laboratories, Prof. Holstlaan 4,

DocID: 1ujMY - View Document

Secure or Insure? A Game-Theoretic Analysis of Information Security Games Jens Grossklags Nicolas Christin

DocID: 1rBzP - View Document

Cryptography / Key management / Public-key cryptography / Public key infrastructure / DiffieHellman key exchange / Key-agreement protocol / Information-theoretic security / IEEE 802.11 / RSA / Key generation / Key distribution / Secure channel

Random Channel Hopping Schemes for Key Agreement in Wireless Networks Bin Zan Marco Gruteser

DocID: 1r3wb - View Document

Cryptography / Cryptographic protocols / Secure multi-party computation / Public-key cryptography / Oblivious transfer / Information-theoretic security / Secure two-party computation / Commitment scheme

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

DocID: 1qUxu - View Document

Cryptography / Wireless networking / Vehicle telematics / Public-key cryptography / Emerging technologies / Driving / Vehicle-to-vehicle / Vehicular communication systems / Information-theoretic security / Dedicated short-range communications / IEEE 802.11 / Key distribution

C:/Users/Bin/Documents/proposal/proposalTex/security/secretKeyNew/final_for_TVT/BinZanTVT.dvi

DocID: 1qGUn - View Document