Semantically Secure Anonymity: Foundations of Re-encryption.
Adam L. YoungMoti YungPublished in: IACR Cryptol. ePrint Arch. (2016)
Keyphrases
- security properties
- data protection
- security requirements
- data encryption
- security analysis
- key exchange
- key management
- cryptographic protocols
- mutual authentication
- privacy protection
- digital signature
- encryption scheme
- formal model
- diffie hellman
- security protocols
- trusted third party
- data confidentiality
- stream cipher
- integrity verification
- artificial intelligence
- semantic information
- digital rights management
- secure communication
- advanced encryption standard
- encryption algorithm
- encryption algorithms
- encryption decryption
- public key
- secret sharing
- private key
- data quality
- information security
- access control
- natural language
- image encryption
- data security
- sensitive data
- sensitive information
- smart card