Login / Signup

A Practical Ciphertext-Only Attack on GMR-2 System.

Dongjae LeeJaewoo KimDeukjo HongJaechul SungSeokhie Hong
Published in: IEEE Access (2023)
Keyphrases
  • ciphertext
  • secret key
  • standard model
  • encryption scheme
  • encryption algorithm
  • access structure
  • proxy re encryption
  • public key
  • private key
  • cca secure
  • database
  • smart card
  • authentication scheme