The Power of Verification Queries in Message Authentication and Authenticated Encryption.
Mihir BellareOded GoldreichAnton MityaginPublished in: IACR Cryptol. ePrint Arch. (2004)
Keyphrases
- integrity verification
- authentication scheme
- message authentication codes
- high security
- image authentication
- image encryption
- key exchange
- public key
- security analysis
- query language
- key distribution
- query processing
- signature verification
- identity authentication
- query evaluation
- key management
- range queries
- public key cryptography
- secret key
- user authentication
- model checking
- encryption decryption
- elliptic curve cryptography
- power consumption
- data encryption
- response time
- database
- virtual private network
- key agreement protocol
- secure communication
- multimodal biometrics
- data sources
- web search engines
- cryptographic protocols
- digital signature
- smart card