Composably secure device-independent encryption with certified deletion.
Srijita KunduErnest Y.-Z. TanPublished in: Quantum (2023)
Keyphrases
- data encryption
- encryption scheme
- key management
- key exchange
- security properties
- security analysis
- digital signature
- secret key
- diffie hellman
- cryptographic protocols
- private key
- virtual private network
- cryptographic algorithms
- stream cipher
- security requirements
- public key cryptography
- encryption decryption
- integrity verification
- secure communication
- mutual authentication
- public key
- encryption key
- data protection
- authentication scheme
- secret sharing
- ciphertext
- security model
- security issues