Cryptanalysis and Improvement of Practical Convertible Authenticated Encryption Schemes Using Self-Certified Public Keys.
Zuhua ShaoPublished in: Informatica (2006)
Keyphrases
- secret key
- hash functions
- encryption scheme
- authentication scheme
- key distribution
- smart card
- ciphertext
- public key
- standard model
- similarity search
- security analysis
- secure communication
- diffie hellman
- key management
- database
- forward secure
- identity based encryption
- chosen plaintext attack
- authentication protocol
- rfid tags
- privacy preserving
- image encryption
- cca secure