Efficient public-key authenticated deniable encryption schemes.
Yanmei CaoJianghong WeiFangguo ZhangYang XiangXiaofeng ChenPublished in: Comput. Stand. Interfaces (2022)
Keyphrases
- public key
- authentication protocol
- encryption scheme
- authentication scheme
- security analysis
- provably secure
- secret key
- key distribution
- security model
- public key encryption
- standard model
- public key cryptography
- digital signature
- ciphertext
- signature scheme
- proxy re encryption
- user authentication
- private key
- diffie hellman
- blind signature scheme
- identity based encryption
- smart card
- secure communication
- homomorphic encryption
- public key cryptosystem
- chosen ciphertext
- key exchange
- cost effective
- blind signature
- signcryption scheme
- secret sharing scheme