Encryption with Untrusted Keys: Security against Chosen Objects Attack.
Shashank AgrawalShweta AgrawalManoj PrabhakaranPublished in: IACR Cryptol. ePrint Arch. (2018)
Keyphrases
- secret key
- encryption decryption
- encryption algorithm
- encryption scheme
- chosen plaintext attack
- key agreement
- ciphertext
- security properties
- private key
- encrypted data
- image encryption
- encryption algorithms
- key management
- public key
- security policies
- high security
- secure communication
- security analysis
- authentication protocol
- smart card
- diffie hellman
- authentication scheme
- security requirements
- security vulnerabilities
- key exchange protocol
- sensitive data
- denial of service attacks
- cca secure
- mutual authentication
- cyber attacks
- data encryption
- intrusion detection
- third party
- information security
- standard model
- data privacy
- access control
- identity based encryption
- advanced encryption standard
- block cipher
- elliptic curve cryptography
- data security
- security measures
- dos attacks
- hash functions
- pseudorandom
- attack scenarios
- key exchange
- user authentication
- privacy preserving
- integrity verification
- data protection