A Secure and Useful 'Keyless Cryptosystem'.
Mordechai M. YungPublished in: Inf. Process. Lett. (1985)
Keyphrases
- private key
- public key cryptosystem
- key distribution
- public key
- cellular automata
- cca secure
- encryption scheme
- key management
- security analysis
- diffie hellman
- security requirements
- digital signature
- elliptic curve
- public key cryptosystems
- covert channel
- user authentication
- security issues
- image encryption
- secret key
- fault tolerant
- highly efficient
- identity management
- group communication
- standard model
- cryptographic protocols
- security level
- security mechanisms
- ciphertext
- wireless sensor networks
- security protocols