Threshold authenticated encryption scheme using labor-division signature.
Yu-Fang ChungKuo-Hsuan HuangTzer-Shyong ChenPublished in: Comput. Stand. Interfaces (2009)
Keyphrases
- encryption scheme
- key exchange
- standard model
- security analysis
- diffie hellman
- signcryption scheme
- private key
- public key
- secret key
- digital signature
- hash functions
- data sharing
- signature scheme
- authentication scheme
- key distribution
- lossless compression
- cca secure
- ciphertext
- secret sharing scheme
- image encryption scheme
- security model
- provably secure
- proxy re encryption
- image encryption
- similarity measure
- authentication protocol
- similarity search
- query processing
- data structure