CCA Security and Trapdoor Functions via Key-Dependent-Message Security.
Fuyuki KitagawaTakahiro MatsudaKeisuke TanakaPublished in: CRYPTO (3) (2019)
Keyphrases
- high security
- information security
- statistical databases
- security issues
- intrusion detection
- security problems
- access control
- security requirements
- network security
- security measures
- security threats
- data security
- security systems
- security vulnerabilities
- database
- security properties
- computer security
- key management
- functional requirements
- communication channels
- security policies