On the Security of Cryptosystems with All-or-Nothing Transform.
Rui ZhangGoichiro HanaokaHideki ImaiPublished in: ACNS (2004)
Keyphrases
- fuzzy vault
- elliptic curve
- cryptographic protocols
- private key
- security problems
- information security
- smart card
- security level
- statistical databases
- security issues
- public key
- secret key
- access control
- security protocols
- intrusion detection
- key management
- high security
- computer security
- key distribution
- user authentication
- security mechanisms
- security requirements
- network security
- multiscale