An Efficient CCA2-Secure Variant of the McEliece Cryptosystem in the Standard Model
Roohallah RastaghiPublished in: CoRR (2013)
Keyphrases
- cca secure
- standard model
- encryption scheme
- ciphertext
- public key encryption scheme
- public key cryptosystem
- proxy re encryption
- signature scheme
- identity based encryption
- diffie hellman assumption
- diffie hellman
- signcryption scheme
- chosen ciphertext
- provably secure
- public key
- database systems
- security analysis
- keyword search
- blind signature
- secret key
- similarity measure