Deterministic Authenticated Encryption Scheme for Memory Constrained Devices.
Megha AgrawalDonghoon ChangJinkeon KangPublished in: Cryptogr. (2018)
Keyphrases
- encryption scheme
- key exchange
- security analysis
- standard model
- diffie hellman
- public key
- hash functions
- cca secure
- secret key
- data sharing
- authentication scheme
- lossless compression
- ciphertext
- image encryption scheme
- encryption key
- key distribution
- information sharing
- data management
- proxy re encryption
- similarity measure
- public key cryptosystem
- database systems
- database