Tight Security of Twin-DH Hashed ElGamal KEM in Multi-User Setting.
Yuji HashimotoKoji NuidaGoichiro HanaokaPublished in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2022)
Keyphrases
- multi user
- virtual environment
- multi granularity
- virtual world
- single user
- user interface
- information security
- augmented reality
- multiple users
- multi touch
- security policies
- lower bound
- virtual reality
- upper bound
- network security
- intrusion detection
- statistical databases
- security issues
- collaborative writing
- hash functions
- key management
- security analysis
- access control
- multiple access
- three dimensional