Generic constructions of secure-channel free searchable encryption with adaptive security.
Keita EmuraAtsuko MiyajiMohammad Shahriar RahmanKazumasa OmotePublished in: Secur. Commun. Networks (2015)
Keyphrases
- security properties
- key management
- data encryption
- encryption scheme
- security requirements
- key exchange
- covert channel
- stream cipher
- encryption decryption
- security analysis
- integrity verification
- cryptographic protocols
- high security
- private key
- secret key
- security issues
- digital rights management
- security level
- advanced encryption standard
- data confidentiality
- diffie hellman
- public key cryptography
- cryptographic algorithms
- authentication mechanism
- security services
- security measures
- security mechanisms
- security protocols
- key distribution
- digital signature
- elliptic curve cryptography
- public key
- mutual authentication
- encryption algorithms
- data security
- identity authentication
- ciphertext
- secure communication
- security management
- security model
- cca secure
- image encryption
- authentication scheme
- standard model
- resource constrained
- security policies
- ad hoc networks
- smart card
- digital libraries
- identity based cryptography
- encryption key
- key establishment
- sensitive data
- information security
- public key infrastructure
- key exchange protocol
- authentication protocol
- key agreement
- access control
- key agreement protocol
- data protection
- user authentication
- encryption algorithm
- data sharing
- network security
- intrusion detection
- virtual private network
- wireless sensor networks