Partial decryption attacks in security-mediated certificateless encryption.
Sherman S. M. ChowWun-She YapPublished in: IET Inf. Secur. (2009)
Keyphrases
- encryption scheme
- public key cryptography
- encryption decryption
- secret key
- stream cipher
- public key
- signature scheme
- security model
- provably secure
- encryption algorithm
- ciphertext
- public key cryptosystem
- key management
- standard model
- cryptographic protocols
- private key
- security threats
- security analysis
- secure communication
- digital signature
- security protocols
- security mechanisms
- elliptic curve cryptography
- diffie hellman
- advanced encryption standard
- cryptographic algorithms
- security problems
- bilinear pairings
- data security
- encryption algorithms
- blind signature
- security services
- authentication and key agreement
- public key infrastructure
- security properties
- data sharing
- designated verifier
- block cipher
- secret sharing scheme
- data encryption
- security issues
- blind signature scheme
- unauthorized access
- pseudorandom
- elliptic curve
- key distribution
- authentication protocol
- resource constrained
- hash functions
- digital content
- security requirements
- key agreement protocol
- intrusion detection
- authentication scheme