A Symmetric Authenticated Proxy Re-encryption Scheme with Provable Security.
Zhiniang PengShaohua TangLinzhi JiangPublished in: ICCCS (2) (2017)
Keyphrases
- key exchange protocol
- key agreement protocol
- key exchange
- authentication scheme
- password based authenticated key exchange
- intrusion detection
- security requirements
- information security
- network security
- neural network
- security policies
- security issues
- functional requirements
- security systems
- security level
- information assurance
- security management
- access control
- security vulnerabilities
- diffie hellman
- security problems
- security mechanisms
- security threats
- security properties