Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously.
Fuyuki KitagawaRyo NishimakiKeisuke TanakaTakashi YamakawaPublished in: CRYPTO (3) (2019)
Keyphrases
- key management
- security properties
- encryption scheme
- data encryption
- key exchange
- security analysis
- security level
- encryption decryption
- security requirements
- integrity verification
- stream cipher
- private key
- security issues
- high security
- digital rights management
- cryptographic protocols
- secret key
- data security
- public key cryptography
- security mechanisms
- access control
- encryption algorithms
- identity authentication
- data confidentiality
- information security
- digital signature
- security protocols
- security services
- diffie hellman
- mutual authentication
- authentication mechanism
- advanced encryption standard
- cryptographic algorithms
- electronic voting
- standard model
- public key
- security architecture
- ad hoc networks
- cca secure
- security management
- security model
- key distribution
- data protection
- resource constrained
- security measures
- key agreement protocol
- encryption algorithm
- public key infrastructure
- elliptic curve cryptography
- smart card
- public key cryptosystem
- authentication protocol
- network security
- group communication
- security policies
- user authentication
- block cipher
- security patterns
- key agreement
- data integrity
- image encryption
- sensitive data
- hash functions