Separating IND-CPA and Circular Security for Unbounded Length Key Cycles.
Rishab GoyalVenkata KoppulaBrent WatersPublished in: IACR Cryptol. ePrint Arch. (2017)
Keyphrases
- high security
- information security
- access control
- information systems
- intrusion detection
- network security
- fixed length
- security requirements
- security analysis
- database design
- e government
- security policies
- security mechanisms
- computer security
- security systems
- private key
- secure communication
- total length
- neural network