Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication.
Shota YamadaNuttapong AttrapadungBagus SantosoJacob C. N. SchuldtGoichiro HanaokaNoboru KunihiroPublished in: Public Key Cryptography (2012)
Keyphrases
- encryption decryption
- identity authentication
- data encryption
- virtual private network
- integrity verification
- security analysis
- security requirements
- elliptic curve cryptography
- public key cryptography
- security properties
- high security
- encryption algorithms
- first order logic
- encryption scheme
- security mechanisms
- authentication scheme
- key management
- information security
- data security
- private key
- key agreement
- authentication mechanism
- secret key
- public key infrastructure
- trusted platform module
- digital signature scheme
- biometric data
- security level
- authentication protocol
- identity management
- trust negotiation
- authentication systems
- data protection
- mobile commerce
- digital signature
- security model
- elliptic curve
- data integrity
- identity based cryptography
- ad hoc networks
- smart card