Tightly CCA-secure encryption scheme in a multi-user setting with corruptions.
Youngkyung LeeDong Hoon LeeJong Hwan ParkPublished in: Des. Codes Cryptogr. (2020)
Keyphrases
- multi user
- encryption scheme
- cca secure
- public key encryption scheme
- standard model
- security analysis
- virtual environment
- ciphertext
- public key
- virtual world
- data sharing
- secret key
- augmented reality
- user interface
- diffie hellman
- public key cryptosystem
- proxy re encryption
- identity based encryption
- lossless compression
- security model
- hash functions
- database
- image processing
- multiresolution
- database design
- cost effective
- data access