Optimal-Rate Coding Theorem For Adversarial Networks in the Public-Key Setting
Yair AmirPaul BunnRafail OstrovskyPublished in: CoRR (2008)
Keyphrases
- public key
- security analysis
- security model
- digital signature
- secret key
- authentication scheme
- image authentication
- elliptic curve cryptography
- private key
- encryption scheme
- public key cryptography
- coding scheme
- public key cryptosystem
- blind signature
- diffie hellman
- authentication protocol
- provably secure
- signature scheme
- image quality
- public key encryption