Applications of Timed-release Encryption with Implicit Authentication.
Angelique Faye LoeLiam MedleyChristian O'ConnellElizabeth A. QuagliaPublished in: IACR Cryptol. ePrint Arch. (2023)
Keyphrases
- encryption decryption
- data encryption
- identity authentication
- image authentication
- public key cryptography
- virtual private network
- integrity verification
- security analysis
- elliptic curve cryptography
- secret key
- public key
- authentication mechanism
- authentication scheme
- petri net
- high security
- image encryption
- encryption algorithm
- encryption algorithms
- data security
- encryption scheme
- authentication protocol
- private key
- biometric authentication
- key management
- key exchange
- mutual authentication
- key distribution
- digital watermarking
- discrete event
- lightweight
- secure communication
- cloud computing
- security properties
- user authentication
- data confidentiality
- digital signature
- security requirements