Simulation-based security of function-hiding inner product encryption.
Qingsong ZhaoQingkai ZengXimeng LiuHuanliang XuPublished in: Sci. China Inf. Sci. (2018)
Keyphrases
- encryption algorithms
- encryption decryption
- key management
- security properties
- encryption scheme
- data encryption
- high security
- encryption algorithm
- intrusion detection
- security analysis
- network security
- virtual private network
- integrity verification
- key exchange
- image encryption
- cryptographic protocols
- information security
- access control
- security protocols
- secret key
- weight vector
- public key cryptography
- digital rights management
- mutual authentication
- security requirements
- network management
- information systems