Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening.
Mihir BellareDennis HofheinzScott YilekPublished in: EUROCRYPT (2009)
Keyphrases
- key exchange
- encryption scheme
- key management
- data encryption
- security properties
- digital signature
- cryptographic protocols
- stream cipher
- encryption decryption
- security analysis
- integrity verification
- private key
- data confidentiality
- secret key
- public key cryptography
- advanced encryption standard
- cryptographic algorithms
- data protection
- mutual authentication
- diffie hellman
- digital rights management
- standard model
- security requirements
- encryption key
- ciphertext
- data security
- smart card
- elliptic curve cryptography
- public key
- secure communication
- security mechanisms
- provably secure
- identity authentication
- high security
- wireless sensor networks
- lossless compression
- encryption algorithms
- data quality
- image encryption
- public key infrastructure
- security issues
- secret sharing
- resource constrained
- elliptic curve