The COLM Authenticated Encryption Scheme.
Elena AndreevaAndrey BogdanovNilanjan DattaAtul LuykxBart MenninkMridul NandiElmar TischhauserKan YasudaPublished in: J. Cryptol. (2024)
Keyphrases
- encryption scheme
- key exchange
- diffie hellman
- security analysis
- authentication scheme
- secret key
- public key
- standard model
- hash functions
- key distribution
- cca secure
- data sharing
- ciphertext
- security model
- smart card
- secret sharing scheme
- image encryption
- image encryption scheme
- lossless compression
- security properties
- provably secure
- public key cryptosystem
- user authentication
- data access
- encryption key
- databases
- public key encryption