First page Back Continue Last page Overview Graphics
Challenges (II): 
Efficiency of the cryptographic solution:
- Communication patterns:
- Are third parties involved? Which parties need to be on-line?
 
 - Communication complexity: rounds, bandwidth, etc.
 - Computational complexity
 
Security of the solution:
-  Based on what assumptions?
 - What security properties are guaranteed?
 
Notes: