Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption.
Pratish DattaTatsuaki OkamotoKatsuyuki TakashimaPublished in: IACR Cryptol. ePrint Arch. (2018)
Keyphrases
- key management
- encryption scheme
- stream cipher
- key exchange
- security properties
- data encryption
- digital signature
- security analysis
- attribute values
- secret key
- first order logic
- cryptographic algorithms
- security level
- simulation model
- cryptographic protocols
- private key
- secure communication
- information hiding
- security requirements
- encryption key