Research Article
An Information-Theoretic Approach for Secure Protocol Composition
312 downloads
@INPROCEEDINGS{10.1007/978-3-319-23829-6_28, author={Yi-Ting Chiang and Tsan-Sheng Hsu and Churn-Jung Liau and Yun-Ching Liu and Chih-Hao Shen and Da-Wei Wang and Justin Zhan}, title={An Information-Theoretic Approach for Secure Protocol Composition}, proceedings={International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I}, proceedings_a={SECURECOMM}, year={2015}, month={11}, keywords={Privacy-preserving computation Secure multiparty computation Protocol composition}, doi={10.1007/978-3-319-23829-6_28} }
- Yi-Ting Chiang
Tsan-Sheng Hsu
Churn-Jung Liau
Yun-Ching Liu
Chih-Hao Shen
Da-Wei Wang
Justin Zhan
Year: 2015
An Information-Theoretic Approach for Secure Protocol Composition
SECURECOMM
Springer
DOI: 10.1007/978-3-319-23829-6_28
Abstract
Privacy protection has become a crucial issue in the information era. In recent years, many protocols have been developed to accomplish computational tasks collaboratively without revealing the participants’ private data. However, developing protocols for each individual application would not be practical. The more natural and efficient approach would be utilizing basic protocols as building blocks for the construction of complex protocol.
Copyright © 2014–2024 ICST