Authenticated Encryption in the Public-Key Setting: Security Notions and Analyses.
Jee Hea AnPublished in: IACR Cryptol. ePrint Arch. (2001)
Keyphrases
- public key
- key exchange
- public key cryptography
- diffie hellman
- security analysis
- authentication scheme
- elliptic curve cryptography
- private key
- encryption scheme
- session key
- secret key
- digital signature
- security model
- public key cryptosystem
- secure communication
- key distribution
- authentication protocol
- image encryption
- symmetric key
- image authentication
- public key infrastructure
- ciphertext
- security properties
- encryption algorithm
- signature scheme
- high security
- identity based encryption
- standard model
- provably secure
- blind signature scheme
- signcryption scheme
- cca secure
- message authentication codes
- security level
- blind signature
- user authentication
- rfid tags
- key management
- public key encryption
- trusted third party
- security services
- group communication
- elliptic curve
- fault tolerant
- information security
- smart card