Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously.
Fuyuki KitagawaRyo NishimakiKeisuke TanakaTakashi YamakawaPublished in: IACR Cryptol. ePrint Arch. (2018)
Keyphrases
- security properties
- key management
- data encryption
- encryption scheme
- key exchange
- security requirements
- security analysis
- encryption decryption
- security level
- stream cipher
- integrity verification
- cryptographic protocols
- security issues
- public key cryptography
- private key
- high security
- data confidentiality
- security mechanisms
- secret key
- public key
- security protocols
- cryptographic algorithms
- encryption algorithms
- identity authentication
- digital rights management
- mutual authentication
- security measures
- access control
- security management
- security services
- data protection
- diffie hellman
- data security
- key distribution
- digital signature
- key exchange protocol
- elliptic curve cryptography
- security architecture
- authentication protocol
- authentication scheme
- key agreement
- public key infrastructure
- cca secure
- security model
- encryption algorithm
- user authentication
- secure communication
- ciphertext
- provably secure
- sensitive data
- authentication mechanism
- encryption key
- key establishment
- ad hoc networks
- advanced encryption standard
- wireless sensor networks
- hash functions
- standard model
- mobile agent system
- security policies
- resource constrained
- public key encryption