The Security of a Mix-Center Based on a Semantically Secure Cryptosystem.
Douglas WikströmPublished in: INDOCRYPT (2002)
Keyphrases
- public key cryptosystem
- private key
- public key
- symmetric key
- cca secure
- security requirements
- key distribution
- diffie hellman
- security analysis
- key management
- security issues
- elliptic curve
- encryption scheme
- security measures
- security level
- security mechanisms
- digital signature
- security protocols
- signature scheme
- security management
- security properties
- standard model
- ciphertext
- information security
- key agreement protocol
- key agreement
- authentication protocol
- data encryption
- cellular automata
- stream cipher
- encryption algorithm
- key exchange
- secret key
- secure communication
- public key encryption
- security architecture
- security services
- identity management
- authentication scheme
- cryptographic protocols
- security model
- image encryption
- key establishment
- data security
- electronic voting
- sensitive data
- factor authentication
- digital signature scheme
- mobile agent system
- secure routing
- authentication mechanism
- trusted computing
- network security
- integrity verification
- previously mentioned
- countermeasures
- electronic payment
- secret sharing scheme
- user authentication
- security patterns
- block cipher