Some security bounds for the key sizes of DGHV scheme.
Franca MarinelliRiccardo AragonaChiara MarcollaMassimiliano SalaPublished in: Appl. Algebra Eng. Commun. Comput. (2014)
Keyphrases
- high security
- private key
- secure communication
- digital signature scheme
- security analysis
- public key
- lower bound
- upper bound
- encryption key
- information security
- key distribution
- secret sharing scheme
- security model
- authentication mechanism
- public key cryptosystem
- access control
- authentication scheme
- security issues
- image encryption
- error bounds
- intrusion detection
- elliptic curve cryptography
- authentication protocol
- upper and lower bounds
- security requirements
- network security
- diffie hellman
- chosen plaintext
- identity based cryptography
- key management scheme
- protection scheme
- public key cryptography
- provably secure
- security services
- security properties
- security protocols
- statistical databases