The what, why, and how of provably secure encryption.
Dennis HofheinzPublished in: KIT-Nachwuchswissenschaftler-Symposium (2010)
Keyphrases
- provably secure
- public key cryptography
- key management
- encryption scheme
- standard model
- public key
- signature scheme
- security model
- digital signature
- diffie hellman
- hash functions
- ciphertext
- wireless sensor networks
- secret key
- blind signature
- resource constrained
- key distribution
- blind signature scheme
- bilinear pairings
- ad hoc networks
- security analysis
- elliptic curve
- secret sharing scheme
- threshold signature scheme
- private key
- secure communication
- security requirements
- data sharing
- distributed systems