Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software.
Yevgeniy DodisWeiliang LuoShouhuai XuMoti YungPublished in: AsiaCCS (2012)
Keyphrases
- symmetric key
- security protocols
- security mechanisms
- cryptographic algorithms
- key management
- security properties
- public key cryptography
- secure communication
- security services
- security requirements
- smart card
- authentication protocol
- cryptographic protocols
- software development
- cloud computing
- software architecture
- security issues
- resource constrained
- source code
- elliptic curve
- digital signature
- key distribution
- access control
- information systems
- public key
- rfid tags
- embedded systems
- database design
- database systems