Cryptanalysis of an authenticated encryption scheme using self-certified public keys.
Chwei-Shyong TsaiShu-Chen LinMin-Shiang HwangPublished in: Appl. Math. Comput. (2005)
Keyphrases
- encryption scheme
- secret key
- authentication scheme
- hash functions
- key distribution
- standard model
- security analysis
- smart card
- key exchange
- public key
- diffie hellman
- ciphertext
- secure communication
- private key
- cca secure
- similarity search
- authentication protocol
- key management
- secret sharing scheme
- chosen plaintext attack
- image encryption
- provably secure
- encryption algorithm
- security model
- group communication
- identity based encryption