Cryptographic Accumulators: New Definitions, Enhanced Security, and Delegatable Proofs.
Anaïs BarthoulotOlivier BlazySébastien CanardPublished in: AFRICACRYPT (2024)
Keyphrases
- security protocols
- key management
- security properties
- encryption scheme
- encryption decryption
- secure communication
- cryptographic protocols
- high assurance
- public key cryptography
- information security
- random number generator
- fuzzy vault
- cryptographic algorithms
- statistical databases
- encryption key
- security requirements
- intrusion detection
- security policies
- security problems
- elliptic curve cryptography
- smart card
- access control
- public key
- public key encryption
- security level
- security issues
- security services
- security threats
- stream cipher
- network security
- security model
- security mechanisms
- sensitive data
- hash functions
- theorem prover