Secure Delegation of Isogeny Computations and Cryptographic Applications.
Robi PedersenOsmanbey UzunkolPublished in: IACR Cryptol. ePrint Arch. (2019)
Keyphrases
- key management
- security protocols
- cryptographic protocols
- encryption key
- public key encryption
- security properties
- secure communication
- smart card
- digital signature
- encryption scheme
- stream cipher
- security requirements
- cryptographic algorithms
- public key cryptography
- security analysis
- authentication protocol
- ad hoc networks
- key distribution
- public key
- conflict resolution
- proxy re encryption
- security services
- diffie hellman
- advanced encryption standard
- standard model
- security mechanisms
- secret key
- homomorphic encryption
- cross domain
- security policies
- access control
- encryption decryption
- resource constrained
- block cipher
- wireless sensor networks
- sensitive data
- access control systems
- data sharing
- hash functions
- network security
- lightweight
- high assurance
- role based access control