Deniable encryption protocols based on probabilistic public-key encryption.
Nikolay A. MoldovyanAndrey Nikolaevich BerezinAnatoly KornienkoAlexander A. MoldovyanPublished in: FRUCT (2017)
Keyphrases
- authentication protocol
- public key
- public key encryption
- encryption scheme
- security analysis
- secret key
- ciphertext
- identity based encryption
- cryptographic protocols
- digital signature
- proxy re encryption
- smart card
- security model
- private key
- security properties
- security protocols
- secure communication
- key distribution
- standard model
- key management
- diffie hellman
- hash functions
- lightweight
- public key cryptosystem
- structured data
- rfid tags
- database