Almost Tight Multi-user Security Under Adaptive Corruptions from LWE in the Standard Model.
Shuai HanShengli LiuZhedong WangDawu GuPublished in: CRYPTO (5) (2022)
Keyphrases
- multi user
- standard model
- encryption scheme
- diffie hellman assumption
- identity based signature
- signcryption scheme
- public key encryption scheme
- diffie hellman
- provably secure
- virtual environment
- identity based encryption
- signature scheme
- cca secure
- forward secure
- virtual world
- multi granularity
- user interface
- multiple users
- augmented reality
- single user
- intrusion detection
- security analysis
- proxy re encryption
- public key
- threshold signature scheme
- access control
- information security
- ciphertext
- public key cryptography
- secret key
- security requirements
- security policies