Lower and Upper Bounds for Deniable Public-Key Encryption.
Rikke BendlinJesper Buus NielsenPeter Sebastian NordholtClaudio OrlandiPublished in: IACR Cryptol. ePrint Arch. (2011)
Keyphrases
- lower and upper bounds
- public key encryption
- authentication protocol
- public key
- security analysis
- lower bound
- upper bound
- proxy re encryption
- security model
- identity based encryption
- encryption scheme
- secret key
- lagrangian relaxation
- signature scheme
- smart card
- lightweight
- ciphertext
- rfid tags
- security protocols
- public key cryptosystem
- information systems