A Characterization of Authenticated-Encryption as a Form of Chosen-Ciphertext Security.
Tom ShrimptonPublished in: IACR Cryptol. ePrint Arch. (2004)
Keyphrases
- encryption scheme
- chosen ciphertext
- key exchange
- standard model
- ciphertext
- diffie hellman
- security analysis
- cca secure
- secret key
- public key encryption scheme
- public key
- key agreement protocol
- data sharing
- key exchange protocol
- hash functions
- security properties
- information security
- key distribution
- encryption algorithm
- encryption algorithms
- secret sharing scheme
- key management
- security model
- secret sharing
- public key cryptography
- security policies
- security requirements
- lossless compression
- access control
- data warehouse