Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack.
Ronald CramerVictor ShoupPublished in: SIAM J. Comput. (2003)
Keyphrases
- chosen ciphertext
- encryption scheme
- public key
- standard model
- ciphertext
- forward secure
- security analysis
- public key encryption scheme
- secret key
- signcryption scheme
- cca secure
- security model
- private key
- proxy re encryption
- public key encryption
- diffie hellman
- provably secure
- public key cryptography
- digital signature
- secret sharing scheme
- homomorphic encryption
- encryption algorithm
- authentication protocol
- lossless compression
- signature scheme
- data sharing
- blind signature scheme
- authentication scheme
- data model
- data access