Almost Tight Multi-User Security under Adaptive Corruptions from LWE in the Standard Model.
Shuai HanShengli LiuZhedong WangDawu GuPublished in: IACR Cryptol. ePrint Arch. (2023)
Keyphrases
- multi user
- standard model
- encryption scheme
- identity based signature
- diffie hellman assumption
- diffie hellman
- signcryption scheme
- public key encryption scheme
- provably secure
- cca secure
- identity based encryption
- virtual world
- multi granularity
- signature scheme
- virtual environment
- augmented reality
- proxy re encryption
- multiple users
- single user
- ciphertext
- user interface
- access control
- forward secure
- information security
- intrusion detection
- bilinear pairings
- security analysis
- private key
- public key
- public key cryptosystem
- security model
- security requirements
- security issues
- human computer interaction