Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions.
Mayana PereiraRafael DowsleyAnderson C. A. NascimentoGoichiro HanaokaPublished in: Comput. J. (2015)
Keyphrases
- encryption scheme
- public key
- ciphertext
- cca secure
- identity based encryption
- private key
- public key encryption
- security analysis
- standard model
- security model
- public key cryptosystem
- chosen ciphertext
- proxy re encryption
- diffie hellman
- public key cryptography
- digital signature
- secret key
- chosen plaintext attack
- secret sharing scheme
- encryption algorithm
- authentication protocol
- provably secure
- authentication scheme
- secure communication
- signcryption scheme
- blind signature scheme
- data sharing
- signature scheme
- homomorphic encryption
- blind signature
- lossless compression