Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security.
Yanwei ZhouBo YangPublished in: Comput. J. (2017)
Keyphrases
- public key encryption scheme
- public key
- forward secure
- standard model
- encryption scheme
- cca secure
- public key cryptosystem
- digital signature
- security analysis
- security model
- chosen ciphertext
- blind signature scheme
- information security
- canonical correlation analysis
- secret key
- public key cryptography
- signature scheme
- private key
- secure communication
- search engine
- blind signature
- personal information
- cost effective
- intrusion detection