Subtleties in Security Definitions for Predicate Encryption with Public Index.
Johannes BlömerGennadij LiskePublished in: IACR Cryptol. ePrint Arch. (2017)
Keyphrases
- encryption algorithms
- security properties
- encryption decryption
- encryption scheme
- data encryption
- key management
- encryption algorithm
- virtual private network
- high security
- security requirements
- identity authentication
- security analysis
- key exchange
- integrity verification
- elliptic curve cryptography
- digital rights management
- security protocols
- information security
- public key cryptography
- security policies
- first order logic
- data security
- secret key
- data confidentiality
- mutual authentication
- network security
- stream cipher
- intrusion detection
- cryptographic protocols
- database
- diffie hellman
- public key
- security issues
- network management
- network communication
- digital signature
- security model
- authentication protocol
- standard model
- security mechanisms
- public key infrastructure
- statistical databases
- hash functions
- b tree
- index structure