Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System.
Shuai HanShengli LiuLin LyuDawu GuPublished in: CRYPTO (2) (2019)
Keyphrases
- upper bound
- lower bound
- intrusion detection
- security threats
- access control
- security policies
- network security
- information leakage
- security issues
- statistical databases
- information security
- computer security
- canonical correlation analysis
- security systems
- worst case
- data structure
- hash functions
- modal logic
- principal component analysis
- security model