On the Achievability of Simulation-Based Security for Functional Encryption.
Angelo De CaroVincenzo IovinoAbhishek JainAdam O'NeillOmer PanethGiuseppe PersianoPublished in: CRYPTO (2) (2013)
Keyphrases
- security properties
- encryption algorithms
- encryption scheme
- encryption decryption
- key management
- high security
- encryption algorithm
- identity authentication
- data encryption
- key exchange
- security analysis
- security requirements
- virtual private network
- digital rights management
- information security
- network security
- data confidentiality
- cryptographic algorithms
- image encryption
- private key
- intrusion detection
- security policies
- data security
- access control
- cryptographic protocols
- elliptic curve cryptography
- integrity verification
- secret key
- public key cryptography
- security systems
- security mechanisms
- advanced encryption standard
- network management
- stream cipher
- diffie hellman
- standard model
- data protection
- digital signature
- data integrity
- security protocols
- sensitive data
- public key infrastructure
- security issues
- wireless networks
- security model
- user authentication