File Matching Based on Secure Authentication and Proxy Homomorphic Re-encryption.
Bin YuChen ZhangWeihong LiPublished in: ICMLC (2019)
Keyphrases
- encryption scheme
- data encryption
- security analysis
- integrity verification
- encryption decryption
- public key cryptography
- cryptographic protocols
- authentication mechanism
- authentication scheme
- secret key
- public key
- trusted third party
- key management
- private key
- digital signature
- user authentication
- key exchange
- mutual authentication
- authentication protocol
- key distribution
- security properties
- identity authentication
- image encryption
- proxy re encryption
- secure communication
- diffie hellman
- identity management
- standard model
- public key infrastructure
- security services
- data confidentiality
- data security
- security requirements
- file system
- image authentication
- password authentication
- ciphertext
- security mechanisms
- high security
- stream cipher
- factor authentication
- secret sharing scheme
- elliptic curve cryptography
- smart card
- elliptic curve
- privacy preserving
- bilinear pairings
- encryption algorithms
- provably secure
- encryption algorithm
- security model
- key agreement
- third party