Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives.
Yi-Fan TsengZi-Yuan LiuRaylin TsoPublished in: Des. Codes Cryptogr. (2024)
Keyphrases
- encryption algorithms
- security properties
- encryption decryption
- key management
- high security
- encryption scheme
- data encryption
- security analysis
- encryption algorithm
- identity authentication
- public key cryptography
- elliptic curve cryptography
- security requirements
- cryptographic protocols
- key exchange
- high level
- data security
- security protocols
- digital rights management
- integrity verification
- information security
- private key
- access control
- virtual private network
- security issues
- public key
- stream cipher
- security policies
- first order logic
- diffie hellman
- data confidentiality
- public key infrastructure
- standard model
- image encryption
- low level
- intrusion detection
- smart card
- wireless communication
- data sharing
- statistical databases
- secret key
- security systems
- network management
- security mechanisms
- ad hoc networks
- routing protocol
- network communication
- chaotic sequence
- advanced encryption standard
- secure communication
- wireless sensor networks