First page Back Continue Last page Overview Graphics
Challenges (II):
Efficiency of the cryptographic solution:
- Communication patterns:
- Are third parties involved? Which parties need to be on-line?
- Communication complexity: rounds, bandwidth, etc.
- Computational complexity
Security of the solution:
- Based on what assumptions?
- What security properties are guaranteed?
Notes: