Encryption-Scheme Security in the Presence of Key-Dependent Messages.
John BlackPhillip RogawayThomas ShrimptonPublished in: Selected Areas in Cryptography (2002)
Keyphrases
- encryption scheme
- private key
- security analysis
- public key
- standard model
- cca secure
- encryption key
- high security
- ciphertext
- secret sharing scheme
- diffie hellman
- secret key
- data sharing
- encryption algorithm
- public key cryptosystem
- secure communication
- hash functions
- image encryption
- security model
- signcryption scheme
- lossless compression
- identity based encryption
- public key encryption
- proxy re encryption
- digital signature
- homomorphic encryption
- security requirements
- databases