Public-Key Encryptions with Invariant Security Reductions in the Multi-User Setting.
Mototsugu NishiokaNaohisa KomatsuPublished in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2011)
Keyphrases
- multi user
- public key
- public key cryptosystem
- private key
- security model
- security analysis
- public key encryption scheme
- public key cryptography
- elliptic curve cryptography
- authentication protocol
- diffie hellman
- encryption scheme
- session key
- public key infrastructure
- virtual environment
- multi granularity
- virtual world
- secure communication
- augmented reality
- digital signature
- blind signature scheme
- provably secure
- public key encryption
- user interface
- authentication scheme
- blind signature
- message authentication codes
- image authentication
- signature scheme
- signcryption scheme
- rfid tags
- identity based encryption
- single user
- secret key
- access control
- encryption algorithm
- high security
- cca secure
- standard model
- multiple users
- proxy re encryption
- information security
- digital images
- human computer interaction
- resource constrained
- secret sharing scheme
- key exchange
- security services