Chosen Ciphertext Security from Injective Trapdoor Functions.
Susan HohenbergerVenkata KoppulaBrent WatersPublished in: CRYPTO (1) (2020)
Keyphrases
- chosen ciphertext
- encryption scheme
- ciphertext
- standard model
- public key encryption scheme
- forward secure
- signcryption scheme
- public key
- secret key
- security analysis
- cca secure
- secret sharing scheme
- diffie hellman
- access control
- security model
- intrusion detection
- distributed systems
- private key
- data sharing
- information security
- network security
- signature scheme