Malware encryption schemes - rerandomizable ciphertexts encrypted using environmental keys.
Herman GaltelandKristian GjøsteenPublished in: IACR Cryptol. ePrint Arch. (2017)
Keyphrases
- ciphertext
- encryption scheme
- secret key
- standard model
- chosen plaintext attack
- cca secure
- private key
- encryption algorithm
- proxy re encryption
- public key
- security analysis
- identity based encryption
- data sharing
- diffie hellman
- hash functions
- public key encryption
- security model
- encrypted data
- lossless compression
- smart card
- databases
- image compression