Encryption-Scheme Security in the Presence of Key-Dependent Messages.
John BlackPhillip RogawayThomas ShrimptonPublished in: IACR Cryptol. ePrint Arch. (2002)
Keyphrases
- encryption scheme
- private key
- security analysis
- high security
- cca secure
- public key
- encryption key
- standard model
- secret key
- encryption algorithm
- diffie hellman
- ciphertext
- security model
- public key cryptosystem
- data sharing
- secret sharing scheme
- proxy re encryption
- lossless compression
- secure communication
- homomorphic encryption
- image processing
- public key encryption
- authentication scheme
- signature scheme
- hash functions
- high dimensional
- information security
- data integration
- access control