Miniature CCA2 PK Encryption: Tight Security Without Redundancy.
Xavier BoyenPublished in: ASIACRYPT (2007)
Keyphrases
- security properties
- encryption algorithms
- encryption decryption
- encryption scheme
- data encryption
- encryption algorithm
- key management
- high security
- identity authentication
- security requirements
- key exchange
- digital rights management
- security analysis
- canonical correlation analysis
- cryptographic protocols
- lower bound
- intrusion detection
- virtual private network
- security policies
- elliptic curve cryptography
- information security
- public key cryptography
- upper bound
- worst case
- security protocols
- access control
- statistical databases
- image encryption
- secret key
- integrity verification
- data confidentiality
- private key
- network communication
- partial least squares
- security mechanisms
- ciphertext
- public key
- security issues
- data storage
- network security
- data protection
- standard model
- security model