CCA Updatable Encryption Against Malicious Re-encryption Attacks.
Long ChenYanan LiQiang TangPublished in: ASIACRYPT (3) (2020)
Keyphrases
- encryption scheme
- encryption algorithms
- malicious attacks
- malicious users
- advanced encryption standard
- stream cipher
- detect malicious
- encryption decryption
- image encryption
- security properties
- digital signature
- cryptographic protocols
- malicious behavior
- cryptographic algorithms
- security analysis
- secret key
- encryption algorithm
- ciphertext
- public key cryptography
- image authentication
- information hiding
- canonical correlation analysis
- key management
- security mechanisms