Cryptanalysis of publicly verifiable authenticated encryption.
Zuhua ShaoPublished in: IACR Cryptol. ePrint Arch. (2003)
Keyphrases
- secret key
- authentication scheme
- key exchange
- key distribution
- diffie hellman
- smart card
- encryption decryption
- encryption scheme
- key exchange protocol
- image encryption
- security analysis
- ciphertext
- public key
- hash functions
- block cipher
- secure communication
- pseudorandom
- key management
- key agreement protocol
- signature scheme
- secret sharing
- private key
- security properties
- encryption algorithms
- sufficient conditions
- group communication
- standard model
- s box
- scatter search
- secret sharing scheme
- authentication protocol
- similarity search
- low cost