Lower and Upper Bounds for Deniable Public-Key Encryption.
Rikke BendlinJesper Buus NielsenPeter Sebastian NordholtClaudio OrlandiPublished in: ASIACRYPT (2011)
Keyphrases
- lower and upper bounds
- public key encryption
- authentication protocol
- public key
- lower bound
- upper bound
- security analysis
- proxy re encryption
- security model
- secret key
- identity based encryption
- lagrangian relaxation
- encryption scheme
- signature scheme
- public key cryptosystem
- provably secure
- smart card
- real time
- rfid tags
- lightweight
- ciphertext
- information systems