NoCry: No More Secure Encryption Keys for Cryptographic Ransomware.
Ziya Alper GençGabriele LenziniPeter Y. A. RyanPublished in: ETAA@ESORICS (2019)
Keyphrases
- secret key
- encryption scheme
- key management
- private key
- security properties
- key agreement
- stream cipher
- public key cryptography
- digital signature
- public key
- encryption decryption
- advanced encryption standard
- ciphertext
- hash functions
- secure communication
- key establishment
- smart card
- security protocols
- symmetric key
- diffie hellman
- security analysis
- key distribution
- cryptographic algorithms
- chosen plaintext attack
- data encryption standard
- cryptographic protocols
- key exchange
- authentication scheme
- encryption key
- public key encryption
- image encryption
- security requirements
- identity based encryption
- elliptic curve cryptography
- cca secure
- standard model
- secret sharing scheme
- elliptic curve
- key management scheme
- block cipher
- security model
- security level
- security mechanisms
- public key infrastructure
- encrypted data
- mutual authentication
- provably secure
- data sharing
- sensitive data
- security services
- ad hoc networks
- group communication
- similarity search
- wireless sensor networks
- s box
- data encryption
- pseudorandom
- resource constrained
- proxy re encryption
- data security
- authentication protocol
- information security
- secret sharing