Almost Tight Multi-User Security under Adaptive Corruptions & Leakages in the Standard Model.
Shuai HanShengli LiuDawu GuPublished in: IACR Cryptol. ePrint Arch. (2023)
Keyphrases
- multi user
- standard model
- encryption scheme
- identity based signature
- diffie hellman assumption
- signcryption scheme
- diffie hellman
- public key encryption scheme
- provably secure
- virtual environment
- proxy re encryption
- identity based encryption
- signature scheme
- virtual world
- multi granularity
- multiple users
- security model
- augmented reality
- cca secure
- public key
- single user
- user interface
- ciphertext
- forward secure
- security analysis
- private key
- access control
- computer vision
- public key cryptosystem
- blind signature
- blind signature scheme
- information security
- intrusion detection
- key management
- security mechanisms
- secret key
- security issues