From Selective to Adaptive Security in Functional Encryption.
Prabhanjan AnanthZvika BrakerskiGil SegevVinod VaikuntanathanPublished in: CRYPTO (2) (2015)
Keyphrases
- encryption algorithms
- security properties
- security analysis
- key management
- encryption scheme
- identity authentication
- high security
- encryption decryption
- data encryption
- key exchange
- security requirements
- encryption algorithm
- intrusion detection
- elliptic curve cryptography
- integrity verification
- access control
- digital rights management
- data security
- security protocols
- network security
- virtual private network
- data confidentiality
- stream cipher
- security level
- sensitive data
- statistical databases
- security policies
- information security