Secure Logging Schemes and Certificate Transparency.
Benjamin DowlingFelix GüntherUdyani HerathDouglas StebilaPublished in: IACR Cryptol. ePrint Arch. (2016)
Keyphrases
- public key encryption
- authentication mechanism
- public key
- factor authentication
- proxy re encryption
- main memory databases
- authentication scheme
- identity based encryption
- encryption scheme
- key management scheme
- public key infrastructure
- provably secure
- neural network
- ciphertext
- security issues
- lightweight
- key exchange
- cryptographic algorithms
- security level
- information security