A secure traitor tracing scheme against key exposure.
Kazuto OgawaGoichiro HanaokaHideki ImaiPublished in: ISIT (2005)
Keyphrases
- secure communication
- private key
- high security
- security analysis
- encryption key
- key distribution
- public key
- authentication scheme
- public key encryption
- secret sharing
- protection scheme
- diffie hellman
- smart card
- key management
- image encryption
- standard model
- digital signature scheme
- provably secure
- electronic voting
- chosen plaintext
- authentication protocol
- security protocols
- secret key
- multi party