On the practical CPAD security of "exact" and threshold FHE schemes and libraries.
Marina ChecriRenaud SirdeyAymen BoudguigaJean-Paul BultelAntoine ChoffrutPublished in: IACR Cryptol. ePrint Arch. (2024)
Keyphrases
- real world
- security policies
- statistical databases
- security issues
- information security
- access control
- computer security
- provably secure
- key management scheme
- digital libraries
- security threats
- information assurance
- database
- security requirements
- security analysis
- security problems
- key agreement
- signcryption scheme
- threshold selection
- security model
- security mechanisms
- practical application
- intrusion detection
- multimedia