Message-Locked Encryption and Secure Deduplication.
Mihir BellareSriram KeelveedhiThomas RistenpartPublished in: IACR Cryptol. ePrint Arch. (2012)
Keyphrases
- key management
- encryption scheme
- key exchange
- data encryption
- security properties
- digital signature
- stream cipher
- data confidentiality
- cryptographic protocols
- security analysis
- encryption decryption
- integrity verification
- private key
- public key
- public key cryptography
- secret key
- digital rights management
- diffie hellman
- image encryption
- data quality
- data protection
- advanced encryption standard
- high security
- sensitive data
- secure communication
- cryptographic algorithms
- wireless sensor networks
- authentication scheme
- ciphertext
- standard model
- security requirements
- key distribution
- authentication protocol
- resource constrained
- record linkage
- program chairs
- privacy preserving
- encryption algorithms
- mutual authentication
- security issues
- security level
- security mechanisms
- block cipher
- identity authentication
- data cleaning
- communication channels
- security protocols
- formal model
- ad hoc networks
- secret sharing scheme
- lightweight
- access control