Encryption Schemes Secure Against Profiling Adversaries.
Sandra Díaz-SantiagoDebrup ChakrabortyPublished in: ICETE (Selected Papers) (2012)
Keyphrases
- encryption scheme
- public key encryption
- chosen ciphertext
- standard model
- security analysis
- cca secure
- diffie hellman
- public key
- homomorphic encryption
- secret sharing scheme
- data sharing
- encryption key
- hash functions
- private key
- secret sharing
- security model
- lossless compression
- proxy re encryption
- ciphertext
- secret key
- chosen plaintext attack
- encryption algorithm
- privacy preserving
- user authentication
- public key cryptosystem
- identity based encryption