Secure Logging Schemes and Certificate Transparency.
Benjamin DowlingFelix GüntherUdyani HerathDouglas StebilaPublished in: ESORICS (2) (2016)
Keyphrases
- public key encryption
- authentication mechanism
- proxy re encryption
- encryption scheme
- public key
- key management scheme
- factor authentication
- data encryption
- standard model
- public key infrastructure
- main memory databases
- cryptographic algorithms
- key management
- security analysis
- cryptographic protocols
- lightweight
- provably secure
- identity based encryption
- key agreement
- authentication scheme
- data structure
- security level
- ciphertext
- security requirements
- wireless sensor networks