Deducing trapdoor primitives in public key encryption schemes.
Chandra PandeyPublished in: Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security (2005)
Keyphrases
- public key
- ciphertext
- encryption scheme
- security analysis
- proxy re encryption
- secret key
- standard model
- cca secure
- private key
- digital signature
- security model
- public key encryption
- chosen ciphertext
- public key cryptography
- signature scheme
- diffie hellman
- public key cryptosystem
- secure communication
- identity based encryption
- encryption algorithm
- secret sharing scheme
- rfid tags
- authentication scheme
- blind signature scheme
- authentication protocol