Multi-user Security of the Elephant v2 Authenticated Encryption Mode.
Tim BeyneYu Long ChenChristoph DobraunigBart MenninkPublished in: SAC (2021)
Keyphrases
- multi user
- key exchange
- key exchange protocol
- encryption algorithms
- key management
- security properties
- encryption scheme
- virtual environment
- encryption decryption
- authentication scheme
- security analysis
- key distribution
- diffie hellman
- data encryption
- multi granularity
- key agreement protocol
- identity authentication
- multiple users
- secret key
- augmented reality
- virtual world
- single user
- high security
- password based authenticated key exchange
- elliptic curve cryptography
- encryption algorithm
- user interface
- virtual private network
- digital signature
- stream cipher
- image encryption
- information security
- security issues
- digital rights management
- standard model
- private key
- security requirements
- integrity verification
- multiple access
- security policies
- data confidentiality
- access control
- wireless sensor networks
- computer vision
- network security
- mutual authentication
- public key cryptography
- public key
- security mechanisms
- security model
- user authentication