Asymptotically Tight Lower Bounds in Anonymous Broadcast Encryption and Authentication.
Hirokazu KobayashiYohei WatanabeJunji ShikataPublished in: IMACC (2021)
Keyphrases
- lower bound
- encryption decryption
- worst case
- data encryption
- upper bound
- identity authentication
- public key cryptography
- image authentication
- integrity verification
- trusted platform module
- virtual private network
- security analysis
- elliptic curve cryptography
- branch and bound algorithm
- public key
- branch and bound
- sample size
- authentication scheme
- secret key
- np hard
- data security
- mutual authentication
- secure communication
- objective function
- high security
- private key
- image encryption
- key exchange
- mobile commerce
- electronic payment
- elliptic curve
- lower and upper bounds
- encryption algorithm
- authentication protocol
- asymptotically optimal
- public key infrastructure
- security properties
- ciphertext
- encryption scheme
- security requirements
- vc dimension
- optimal solution
- biometric authentication
- data confidentiality
- security services
- user authentication
- pseudorandom
- information hiding
- digital signature
- digital watermarking
- key management