How to Protect Yourself without Perfect Shredding
From MaRDI portal
Publication:3519529
DOI10.1007/978-3-540-70583-3_42zbMath1155.68383MaRDI QIDQ3519529
Ran Canetti, Shafi Goldwasser, Dror Eiger, Dah-Yoh Lim
Publication date: 19 August 2008
Published in: Automata, Languages and Programming (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-70583-3_42
universal hashing; adaptive security; secure multiparty computation; randomness extractors; forward security; mobile adversary; proactive security; intrusion resilience; partial erasures
68P25: Data encryption (aspects in computer science)
68M12: Network protocols
94A62: Authentication, digital signatures and secret sharing
Related Items