Chosen Ciphertext Security from Injective Trapdoor Functions.
Susan HohenbergerVenkata KoppulaBrent WatersPublished in: IACR Cryptol. ePrint Arch. (2020)
Keyphrases
- chosen ciphertext
- encryption scheme
- ciphertext
- standard model
- signcryption scheme
- public key
- public key encryption scheme
- security analysis
- information security
- private key
- network security
- security model
- security requirements
- security policies
- secret key
- hash functions
- provably secure
- intrusion detection
- access control
- data structure