A Publicly Verifiable Authenticated Encryption Scheme Based on Factoring and Discrete Logarithms.
Cheng-Yi TsaiChi-Yu LiuShyh-Chang TsaurMin-Shiang HwangPublished in: Int. J. Netw. Secur. (2017)
Keyphrases
- encryption scheme
- secret sharing
- key exchange
- security analysis
- standard model
- secret sharing scheme
- secret key
- authentication scheme
- public key
- diffie hellman
- hash functions
- key distribution
- ciphertext
- cca secure
- image encryption scheme
- data sharing
- lossless compression
- proxy re encryption
- database systems
- provably secure
- public key encryption