Login / Signup
Practical key-dependent message chosen-ciphertext security based on decisional composite residuosity and quadratic residuosity assumptions.
Jinyong Chang
Rui Xue
Published in:
Secur. Commun. Networks (2015)
Keyphrases
</>
encryption scheme
chosen ciphertext
standard model
private key
public key
public key encryption scheme
security analysis
information security
signcryption scheme
security policies
ciphertext
secure communication
cryptographic protocols
security requirements
diffie hellman
cca secure
network security
knn