Tighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge Setting.
Zhengyu ZhangPuwen WeiHaiyang XuePublished in: CANS (2019)
Keyphrases
- high security
- information security
- security policies
- computational model
- security protection
- information integration
- private key
- upper bound
- intrusion detection
- object oriented databases
- network security
- security issues
- mobile agent system
- secure communication
- authentication mechanism
- mathematical proofs
- equational theories
- factor authentication
- quantum computing
- access control mechanism
- security problems
- theorem proving
- mobile agents
- access control