Using Transposition Padding to Get CCA2 Security From Any Deterministic Encryption Schemes.
Linming GongMingming WangXiangjian ZuoShundong LiDaoshun WangPublished in: IEEE Access (2019)
Keyphrases
- encryption scheme
- standard model
- security analysis
- cca secure
- public key
- security model
- diffie hellman
- public key encryption
- secret key
- data sharing
- ciphertext
- homomorphic encryption
- secret sharing scheme
- public key cryptosystem
- identity based encryption
- lossless compression
- encryption algorithm
- proxy re encryption
- hash functions
- data management
- private key
- security requirements
- provably secure
- chosen plaintext attack
- encryption key
- power consumption
- access control