Distributed public key schemes secure against continual leakage.
Adi AkaviaShafi GoldwasserCarmit HazayPublished in: PODC (2012)
Keyphrases
- public key
- public key encryption
- provably secure
- public key encryption scheme
- security analysis
- private key
- digital signature
- security model
- diffie hellman
- public key cryptography
- authentication scheme
- signature scheme
- authentication protocol
- encryption scheme
- message authentication codes
- distributed systems
- secure communication
- blind signature
- public key cryptosystem
- proxy re encryption
- public key infrastructure
- key management
- secret key
- session key
- lightweight
- bilinear pairings
- group communication
- identity based encryption
- key exchange
- homomorphic encryption
- elliptic curve cryptography
- ciphertext
- fault tolerant
- image authentication
- real time
- multi party
- blind signature scheme
- smart card
- security requirements
- peer to peer
- standard model