A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption.
Satoshi HadaKouichi SakuraiPublished in: IWSEC (2007)
Keyphrases
- private key
- public key encryption
- public key
- ciphertext
- encryption scheme
- proxy re encryption
- digital signature
- security analysis
- identity based encryption
- standard model
- secret key
- security model
- signature scheme
- image encryption
- diffie hellman
- provably secure
- lightweight
- motion estimation
- secret sharing scheme
- data sharing