Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp.
Yi-Ruei ChenShiuan-Tzuo ShenWen-Guey TzengPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- key exchange
- encryption scheme
- key management
- data encryption
- security properties
- digital signature
- cryptographic protocols
- security analysis
- encryption decryption
- stream cipher
- data confidentiality
- private key
- information technology
- public key cryptography
- secret key
- digital rights management
- high security
- mutual authentication
- integrity verification
- data security
- key distribution
- authentication scheme
- advanced encryption standard
- security requirements
- identity authentication
- secure communication
- diffie hellman
- public key
- information systems
- image encryption
- linear algebra
- encryption key
- security mechanisms
- security services
- supplier selection
- public key infrastructure
- service providers
- key establishment
- provably secure
- data sharing
- formal model
- data quality
- smart card
- group communication
- secret sharing scheme