Public Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH Assumption.
Mayana PereiraRafael DowsleyGoichiro HanaokaAnderson C. A. NascimentoPublished in: ISC (2010)
Keyphrases
- encryption scheme
- public key
- ciphertext
- public key encryption
- cca secure
- identity based encryption
- private key
- security analysis
- security model
- standard model
- chosen ciphertext
- public key cryptosystem
- diffie hellman
- proxy re encryption
- secret key
- public key cryptography
- encryption algorithm
- chosen plaintext attack
- digital signature
- provably secure
- secret sharing scheme
- authentication protocol
- secure communication
- signature scheme
- authentication scheme
- image encryption
- blind signature scheme
- data sharing
- motion estimation
- secret sharing
- lossless compression