NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion.
Mihir BellareGeorg FuchsbauerAlessandra ScafuroPublished in: ASIACRYPT (2) (2016)
Keyphrases
- security policies
- sensitive data
- access control
- human faces
- security requirements
- information security
- network security
- security management
- intrusion detection
- security issues
- face images
- data privacy
- third party
- biometric systems
- facial images
- security analysis
- parameter space
- security problems
- recognition algorithm
- data storage
- security systems
- security threats
- authentication protocol
- cyber security
- intrusion detection system
- privacy preserving
- cloud computing
- distributed systems