Public-Key Function-Private Hidden Vector Encryption (and More).
James BartusekBrent CarmerAbhishek JainZhengzhong JinTancrède LepointFermi MaTal MalkinAlex J. MalozemoffMariana RaykovaPublished in: ASIACRYPT (3) (2019)
Keyphrases
- public key
- public key cryptography
- digital signature
- encryption scheme
- elliptic curve cryptography
- security analysis
- secret key
- private key
- image authentication
- ciphertext
- homomorphic encryption
- security model
- secure communication
- standard model
- diffie hellman
- public key infrastructure
- signature scheme
- encryption algorithm
- privacy preserving
- authentication scheme
- identity based encryption
- authentication protocol
- elliptic curve
- public key cryptosystem
- security properties
- proxy re encryption
- blind signature
- blind signature scheme
- image encryption
- hidden information
- provably secure
- high security
- information hiding
- rfid tags
- data distribution