Adaptively Secure Inner Product Encryption from LWE.
Shuichi KatsumataRyo NishimakiShota YamadaTakashi YamakawaPublished in: ASIACRYPT (3) (2020)
Keyphrases
- key exchange
- encryption scheme
- key management
- data encryption
- security properties
- stream cipher
- security analysis
- digital signature
- encryption decryption
- cryptographic protocols
- secret key
- data confidentiality
- private key
- digital rights management
- public key
- public key cryptography
- integrity verification
- cryptographic algorithms
- advanced encryption standard
- mutual authentication
- high security
- image encryption
- authentication scheme
- vector space
- encryption algorithm
- security requirements
- standard model
- ad hoc networks
- secure communication
- sensitive data
- data security
- data protection
- encryption key
- identity authentication
- diffie hellman
- security level
- authentication protocol
- data quality
- ciphertext
- key distribution
- formal model
- encryption algorithms
- lightweight
- multimedia streaming
- elliptic curve cryptography
- hash functions
- resource constrained
- security protocols
- provably secure