搜索结果: 1-15 共查到“军事学 three-party”相关记录23条 . 查询时间(0.07 秒)
An Efficient Secure Three-Party Sorting Protocol with an Honest Majority
sorting secret sharing three-party computation
2019/6/13
We present a novel three-party sorting protocol secure against passive adversaries in the honest majority setting. The protocol can be easily combined with other secure protocols which work on shared ...
We settle the exact round complexity of three-party computation (3PC) in honest-majority setting, for a range of security notions such as selective abort, unanimous abort, fairness and guaranteed outp...
Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case
Actively Secure MPC Implementation
2017/6/6
These are exciting times for secure multi-party computation (MPC). While the feasibility of constant-round and actively secure MPC has been known for over two decades, the last few years have witnesse...
Provably Secure Three-party Password Authenticated Key Exchange Protocol Based On Ring Learning With Error
Key Exchange Three-Party PAKE Lattice
2017/4/27
Three-party Password Authenticated Key Exchange (3PAKE) protocol is an important cryptographic primitive, where clients can establish a session key using easy-to-remember passwords. A number of 3PAKE ...
High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority
secure multiparty computation honest majority concrete efficiency
2016/12/10
In this paper, we describe a new information-theoretic protocol (and a computationally-secure variant) for secure {\em three}-party computation with an honest majority. The protocol has very minimal c...
High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority
secure multiparty computation malicious adversaries honest majority
2016/12/8
In this paper, we describe a new protocol for secure three-party computation of any functionality, with an honest majority and a \textit{malicious} adversary. Our protocol has both an information-theo...
Efficient Three-Party Computation from Cut-and-Choose
cryptographic protocols secure computation
2016/1/25
With relatively few exceptions, the literature on efficient (practical) secure computation has
focused on secure two-party computation (2PC). It is, in general, unclear whether the techniques
used t...
Fast and Secure Three-party Computation: The Garbled Circuit Approach
secure computation garbled circuits three-party
2015/12/22
Many deployments of secure multi-party computation (MPC) in practice have used informationtheoretic
three-party protocols that tolerate a single, semi-honest corrupt party, since these protocols
enj...
An Offline Dictionary Attack against a Three-Party Key Exchange Protocol
three-party key exchange password
2014/3/7
Despite all the research efforts made so far, the design of protocols for password-authenticated key exchange (PAKE) still remains a non-trivial task. One of the major challenges in designing such pro...
On the security of a password-only authenticated three-party key exchange protocol
Three-party key exchange Man-in-the-middle (MITM) attack
2014/3/10
This note reports major previously unpublished security vulnerabilities in the password-only authenticated three-party key exchange protocol due to Lee and Hwang (Information Sciences, 180, 1702-1714,...
Weakness of a three-party password-based authenticated key exchange protocol
password-based authenticated key exchange three-party
2009/11/18
To guarantee the quality of the growing popular
communication services, quite recently, Huang presented a simple
and efficient three-party password-based authenticated key
exchange protocol in Inte...
Weaknesses and improvement of three-party authenticated key exchange protocol using elliptic curve cryptography
unknown key-share attack impersonation attack three-party
2009/11/18
Quite recently, Yang et al. presented an efficient three-party authenticated key ex-
change protocol based upon elliptic curve cryptography for mobile-commerce envi-
ronments. In this paper, we demo...
An Efficient Password Security of Three-Party Key Exchange Protocol based on ECDLP
Key exchange protocol Password based secure communication
2009/7/14
In this paper we have proposed an efficient password security of Three-
Party Key Exchange Protocol based on Elliptic Curve Discrete Logarithm
Problem. Key exchange protocols allow two parties commu...
Scalable Compilers for Group Key Establishment : Two/Three Party to Group
Group Key Exchange Compilers Tree Based Group Key Exchange Circular topology
2009/6/12
This work presents the first scalable, efficient and generic compilers to construct group key
exchange (GKE) protocols from two/three party key exchange (2-KE/3-KE) protocols. We propose
three diffe...
Infringing and Improving Password Security of a Three-Party Key Exchange Protocol
Password Security Three-Party Key Exchange Protocol session key
2009/6/2
Infringing and Improving Password Security of a Three-Party Key Exchange Protocol.