Game-based security proofs for verifiable secret sharing schemes in the standard model.
Samaneh MashhadiPublished in: Inf. Secur. J. A Glob. Perspect. (2023)
Keyphrases
- encryption scheme
- standard model
- secret sharing scheme
- secret sharing
- security analysis
- cca secure
- signcryption scheme
- public key encryption scheme
- diffie hellman
- data sharing
- public key
- secret key
- provably secure
- ciphertext
- proxy re encryption
- key management
- lossless compression
- public key cryptosystem
- security model
- private key
- data access
- databases
- forward secure
- ad hoc networks
- query processing