Updatable Encryption with Post-Compromise Security.
Anja LehmannBjörn TackmannPublished in: IACR Cryptol. ePrint Arch. (2018)
Keyphrases
- security properties
- encryption algorithms
- encryption decryption
- encryption scheme
- key management
- high security
- data encryption
- encryption algorithm
- identity authentication
- key exchange
- security requirements
- security analysis
- elliptic curve cryptography
- virtual private network
- digital rights management
- stream cipher
- security issues
- information security
- public key cryptography
- integrity verification
- intrusion detection
- image encryption
- network security
- trade off
- security protocols
- elliptic curve
- data security
- statistical databases
- security policies
- private key
- cryptographic protocols
- data confidentiality
- security mechanisms
- security services
- secure communication
- secret key
- public key
- formal model