Bounded CCA2-Secure Encryption.
Ronald CramerGoichiro HanaokaDennis HofheinzHideki ImaiEike KiltzRafael PassAbhi ShelatVinod VaikuntanathanPublished in: ASIACRYPT (2007)
Keyphrases
- cca secure
- encryption scheme
- ciphertext
- public key encryption scheme
- standard model
- security analysis
- identity based encryption
- public key
- secret key
- data sharing
- hash functions
- public key cryptosystem
- secret sharing scheme
- proxy re encryption
- diffie hellman
- security model
- secret sharing
- databases
- private key
- public key cryptography
- lossless compression
- smart card
- digital images