Delegate predicate encryption and its application to anonymous authentication.
Ribao WeiDingfeng YePublished in: AsiaCCS (2009)
Keyphrases
- encryption decryption
- identity authentication
- data encryption
- public key cryptography
- image authentication
- security analysis
- integrity verification
- virtual private network
- trusted platform module
- elliptic curve cryptography
- mutual authentication
- authentication scheme
- secret key
- authentication mechanism
- public key
- high security
- data security
- mobile commerce
- key exchange
- security properties
- electronic payment
- image encryption
- encryption algorithms
- private key
- authentication protocol
- encryption scheme
- biometric authentication
- encryption algorithm
- first order logic
- fragile watermarking
- elliptic curve
- digital watermarking
- payment systems
- random number
- trusted computing
- biometric data
- cryptographic protocols
- security model
- security mechanisms
- electronic commerce