Generic Constructions of Secure-Channel Free Searchable Encryption with Adaptive Security.
Keita EmuraAtsuko MiyajiMohammad Shahriar RahmanKazumasa OmotePublished in: IACR Cryptol. ePrint Arch. (2013)
Keyphrases
- key management
- security properties
- encryption scheme
- data encryption
- key exchange
- security requirements
- encryption decryption
- security analysis
- covert channel
- private key
- integrity verification
- cryptographic protocols
- stream cipher
- high security
- digital rights management
- secret key
- security issues
- diffie hellman
- security mechanisms
- encryption algorithms
- cryptographic algorithms
- elliptic curve cryptography
- security protocols
- public key
- public key cryptography
- data confidentiality
- security measures
- secure communication
- digital signature
- authentication mechanism
- security management
- encryption algorithm
- data security
- authentication scheme
- key distribution
- security level
- key agreement
- mutual authentication
- advanced encryption standard
- identity authentication
- smart card
- image encryption
- security services
- key agreement protocol
- digital libraries
- identity based cryptography
- data protection
- key establishment
- security model
- information security
- access control
- cca secure
- mobile agent system
- standard model
- key exchange protocol
- user authentication
- elliptic curve
- ad hoc networks
- virtual private network
- public key encryption
- security patterns
- provably secure
- authentication protocol
- digital content
- data sharing
- network security
- intrusion detection