Fully Secure Functional Encryption without Obfuscation.
Sanjam GargCraig GentryShai HaleviMark ZhandryPublished in: IACR Cryptol. ePrint Arch. (2014)
Keyphrases
- key management
- key exchange
- data encryption
- encryption scheme
- security properties
- security analysis
- stream cipher
- integrity verification
- encryption decryption
- digital signature
- advanced encryption standard
- digital rights management
- public key cryptography
- cryptographic algorithms
- data confidentiality
- cryptographic protocols
- diffie hellman
- standard model
- public key
- reverse engineering
- malware detection
- static analysis
- mutual authentication
- data transformation
- block cipher
- data protection
- ad hoc networks
- encryption algorithms
- security requirements
- authentication protocol
- data security
- security protocols
- control flow
- smart card