Almost Tight Multi-user Security Under Adaptive Corruptions & Leakages in the Standard Model.
Shuai HanShengli LiuDawu GuPublished in: EUROCRYPT (3) (2023)
Keyphrases
- multi user
- standard model
- encryption scheme
- diffie hellman assumption
- identity based signature
- public key encryption scheme
- signcryption scheme
- diffie hellman
- provably secure
- virtual environment
- threshold signature scheme
- virtual world
- forward secure
- multi granularity
- cca secure
- augmented reality
- identity based encryption
- proxy re encryption
- user interface
- signature scheme
- information security
- single user
- multiple users
- public key
- network security
- access control
- ciphertext
- security analysis
- security policies
- bilinear pairings
- intrusion detection
- blind signature scheme
- blind signature
- public key cryptosystem
- computer vision