On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification.
Afonso ArriagaManuel BarbosaPooya FarshimPublished in: ACNS (2012)
Keyphrases
- encryption scheme
- information security
- security model
- public key
- security issues
- public key cryptosystem
- private key
- public key encryption
- access control
- security protocols
- standard model
- security properties
- cca secure
- chosen ciphertext
- security policies
- data integrity
- authentication protocol
- key management
- digital signature
- security requirements
- blind signature scheme
- signature scheme