Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity.
Atsushi TakayasuPublished in: Des. Codes Cryptogr. (2021)
Keyphrases
- ring signature scheme
- encryption scheme
- security properties
- public key encryption
- security requirements
- security issues
- security level
- cca secure
- security mechanisms
- information security
- key management
- security measures
- access control
- security architecture
- security management
- data security
- key agreement protocol
- data encryption
- smart card
- identity management
- sensitive data
- security analysis
- data protection
- key exchange protocol
- security protocols
- security patterns
- intrusion detection
- cryptographic protocols
- authentication protocol
- stream cipher
- integrity verification
- lower bound
- diffie hellman
- network security
- secure communication
- mobile agent system
- security services
- rfid systems
- user authentication
- trusted third party
- security policies
- authentication scheme
- private key
- authentication mechanism
- public key cryptosystem
- statistical databases
- public key
- cloud computing