An Efficient and Secure Location-based Alert Protocol using Searchable Encryption and Huffman Codes.
Sina ShahamGabriel GhinitaCyrus ShahabiPublished in: CoRR (2021)
Keyphrases
- cryptographic protocols
- security properties
- key exchange
- security analysis
- mutual authentication
- cryptographic algorithms
- key management
- security protocols
- covert channel
- diffie hellman
- key distribution
- authentication protocol
- encryption scheme
- provably secure
- lightweight
- scalar product
- security requirements
- encryption decryption
- group communication
- data encryption
- secret key
- key exchange protocol
- rfid systems
- stream cipher
- digital signature
- rfid tags
- private key
- trusted third party
- key agreement protocol
- smart card
- elliptic curve cryptography
- security issues
- encryption algorithm
- elliptic curve
- standard model
- secure communication
- digital libraries
- key establishment
- integrity verification
- public key cryptography
- social networking
- image encryption
- security model
- data confidentiality
- location based services
- error correction
- privacy preserving
- security services
- authentication scheme
- privacy protection
- signature scheme
- public key