Keyphrases
- chosen ciphertext
- encryption scheme
- standard model
- forward secure
- public key encryption scheme
- signcryption scheme
- security analysis
- public key
- security model
- ciphertext
- diffie hellman
- cca secure
- information security
- secret key
- data sharing
- security requirements
- key management
- cryptographic protocols
- access control
- security policies
- hash functions
- network security
- database applications
- intrusion detection