Using Predicate Extension for Predicate Encryption to Generically Obtain Chosen-Ciphertext Security and Signatures.
Marloes VenemaLeon BotrosPublished in: IACR Commun. Cryptol. (2024)
Keyphrases
- encryption scheme
- chosen ciphertext
- security analysis
- public key
- standard model
- encryption algorithms
- cca secure
- ciphertext
- digital signature
- public key encryption scheme
- encryption algorithm
- data sharing
- secret key
- lossless compression
- public key cryptosystem
- key management
- information security
- public key cryptography
- diffie hellman
- cryptographic protocols
- hash functions
- security mechanisms
- security properties
- signature scheme
- network security
- security model
- sensor networks
- databases