On the Security of Keyed-Homomorphic PKE: Preventing Key Recovery Attacks and Ciphertext Validity Attacks.
Keita EmuraPublished in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2021)
Keyphrases
- encryption scheme
- chosen ciphertext
- ciphertext
- standard model
- cryptographic protocols
- security threats
- private key
- chosen plaintext attack
- security protocols
- security mechanisms
- public key
- block cipher
- diffie hellman
- cca secure
- signcryption scheme
- security analysis
- watermarking scheme
- security issues
- secret sharing scheme
- information security
- privacy preserving
- forward secure
- data sharing
- data model
- encryption algorithm
- access control
- intrusion detection
- databases
- security policies
- security requirements