Attainable Unconditional Security for Shared-Key Cryptosystems.
Fabrizio BiondiThomas Given-WilsonAxel LegayPublished in: TrustCom/BigDataSE/ISPA (1) (2015)
Keyphrases
- private key
- public key
- high security
- security analysis
- cryptographic protocols
- elliptic curve
- signature scheme
- fuzzy vault
- information security
- security issues
- access control
- image encryption
- key distribution
- secret key
- statistical databases
- network security
- intrusion detection
- security mechanisms
- cyber security
- encryption scheme
- ciphertext
- secret sharing scheme
- functional requirements
- security management
- data mining