CCA2 secure public-key encryption scheme tolerating continual leakage attacks.
Yanwei ZhouBo YangWenzheng ZhangYi MuPublished in: Secur. Commun. Networks (2016)
Keyphrases
- public key encryption scheme
- chosen ciphertext
- cca secure
- encryption scheme
- standard model
- forward secure
- public key
- ciphertext
- public key cryptosystem
- secret key
- signcryption scheme
- security analysis
- diffie hellman
- cryptographic protocols
- proxy re encryption
- security protocols
- signature scheme
- hash functions
- watermarking scheme
- secret sharing scheme
- security model
- blind signature scheme
- public key cryptography
- rfid tags
- image compression