Using All-or-Nothing Encryption to Enhance the Security of Searchable Encryption.
Wenqi MaQingbo WuYusong TanChunguang WangQuanyuan WuHuaping HuPublished in: CSE (2013)
Keyphrases
- encryption algorithms
- encryption scheme
- security properties
- encryption decryption
- key management
- encryption algorithm
- key exchange
- data encryption
- high security
- identity authentication
- security analysis
- stream cipher
- integrity verification
- virtual private network
- digital rights management
- private key
- elliptic curve cryptography
- standard model
- image encryption
- secret key
- public key cryptography
- data confidentiality
- digital signature
- advanced encryption standard
- formal model
- ciphertext
- security model
- data security
- security issues
- smart card
- key distribution
- data quality
- cryptographic algorithms
- security protocols
- authentication scheme
- access control