Better Security Estimates for Approximate, IoT-Friendly R-LWE Cryptosystems.
Ruth O'ConnorAyesha KhalidMáire O'NeillWeiqiang LiuPublished in: APCCAS (2022)
Keyphrases
- fuzzy vault
- elliptic curve
- security problems
- key management
- cryptographic protocols
- private key
- management system
- security requirements
- information security
- secret key
- security issues
- access control
- key distribution
- public key
- efficient computation
- statistical databases
- security policies
- cloud computing
- intrusion detection
- smart card
- network security
- signature scheme
- public key cryptosystems
- rfid systems
- confidence intervals
- big data
- data security
- security analysis
- security mechanisms
- security services
- high security
- friendly interface
- low cost
- mobile devices