Efficient key encapsulation mechanisms with tight security reductions to standard assumptions in the two security models.
Yoshikazu HanataniGoichiro HanaokaTakahiro MatsudaTakashi YamakawaPublished in: Secur. Commun. Networks (2016)
Keyphrases
- high security
- security mechanisms
- security services
- information security
- statistical databases
- security issues
- security systems
- security policies
- lightweight
- experimental data
- neural network
- access control
- security requirements
- complex systems
- computational models
- security measures
- simplifying assumptions
- intrusion detection
- upper bound
- probabilistic model
- computer security
- security problems
- key distribution
- efficient computation
- iso iec
- security protocols
- security analysis
- sensitive data
- personal information
- network security
- relational databases