Don't Tamper with Dual System Encryption - Beyond Polynomial Related-Key Security of IBE.
Tsz Hon YuenCong ZhangSherman S. M. ChowPublished in: ACNS (2022)
Keyphrases
- encryption scheme
- high security
- security properties
- private key
- encryption algorithms
- security analysis
- cca secure
- data encryption standard
- secret key
- public key
- image encryption
- key management
- security requirements
- identity authentication
- encryption algorithm
- data encryption
- secure communication
- standard model
- security protocols
- encryption decryption
- security level
- digital rights management
- image authentication
- smart card
- ciphertext
- security model
- cryptographic protocols
- digital signature
- elliptic curve cryptography
- lossless compression
- formal model
- forward secure
- public key cryptosystem
- information security
- integrity verification
- virtual private network
- access control