Abuse-resistant deniable encryption.
Yanmei CaoJianghong WeiYang XiangWilly SusiloXiaofeng ChenPublished in: Comput. Stand. Interfaces (2024)
Keyphrases
- authentication protocol
- secret key
- security analysis
- smart card
- encryption scheme
- public key
- digital signature
- security properties
- key exchange
- encryption algorithm
- image encryption
- encryption algorithms
- encryption decryption
- security protocols
- hash functions
- key management
- lightweight
- ciphertext
- data encryption
- database systems