Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions.
Alexandra BoldyrevaNathan ChenetteAdam O'NeillPublished in: IACR Cryptol. ePrint Arch. (2012)
Keyphrases
- security analysis
- order preserving
- encryption scheme
- security properties
- high security
- key exchange
- image encryption
- encryption algorithm
- elliptic curve cryptography
- public key
- hash functions
- smart card
- mutual authentication
- minimal perfect hash functions
- security requirements
- authentication protocol
- private key
- secret key
- authentication scheme
- data sharing
- digital signature
- user authentication
- information security
- lightweight