Cryptographic Shallots: A Formal Treatment of Repliable Onion Encryption.
Megumi AndoAnna LysyanskayaPublished in: TCC (3) (2021)
Keyphrases
- formal treatment
- encryption scheme
- data encryption standard
- encryption decryption
- security properties
- digital signature
- key management
- public key cryptography
- encryption algorithms
- advanced encryption standard
- smart card
- cryptographic algorithms
- elliptic curve cryptography
- cryptographic protocols
- secret key
- secure communication
- public key
- security protocols
- encryption key
- elliptic curve
- image encryption
- data security
- security analysis
- security requirements
- stream cipher
- security mechanisms
- ciphertext
- hash functions
- formal model
- key exchange
- natural language
- high security
- block cipher
- s box
- security model
- standard model
- data sharing
- wireless sensor networks
- data sets
- provably secure
- authentication scheme
- pseudorandom
- secret sharing scheme
- ad hoc networks
- multimedia streaming