Tightly Secure Encryption Schemes against Related-Key Attacks.
Shuai HanShengli LiuLin LyuDawu GuPublished in: Comput. J. (2018)
Keyphrases
- encryption scheme
- chosen ciphertext
- standard model
- private key
- encryption key
- block cipher
- public key encryption
- security analysis
- public key
- hash functions
- ciphertext
- cca secure
- secret key
- security model
- data sharing
- signcryption scheme
- diffie hellman
- secure communication
- cryptographic protocols
- secret sharing
- signature scheme
- security mechanisms
- encryption algorithm
- secret sharing scheme
- chosen plaintext attack
- provably secure
- rfid tags
- security protocols
- video sequences