Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability.
Patrick StruckLucas SchabhüserDenise DemirelJohannes BuchmannPublished in: C2SI (2017)
Keyphrases
- key exchange
- encryption scheme
- security properties
- security analysis
- privacy preserving
- cryptographic protocols
- secret key
- authentication scheme
- standard model
- encryption algorithms
- key exchange protocol
- digital signature
- information hiding
- security requirements
- secret sharing scheme
- key distribution
- objective function
- security model
- policy makers
- key agreement protocol
- hash functions
- information technology