Login / Signup
Efficient public-key authenticated deniable encryption schemes.
Yanmei Cao
Jianghong Wei
Fangguo Zhang
Yang Xiang
Xiaofeng Chen
Published in:
Comput. Stand. Interfaces (2022)
Keyphrases
</>
public key
authentication protocol
encryption scheme
authentication scheme
security analysis
provably secure
secret key
key distribution
security model
public key encryption
standard model
public key cryptography
digital signature
ciphertext
signature scheme
proxy re encryption
user authentication
private key
diffie hellman
blind signature scheme
identity based encryption
smart card
secure communication
homomorphic encryption
public key cryptosystem
chosen ciphertext
key exchange
cost effective
blind signature
signcryption scheme
secret sharing scheme