On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification.
Afonso ArriagaManuel BarbosaPooya FarshimPublished in: IACR Cryptol. ePrint Arch. (2012)
Keyphrases
- encryption scheme
- information security
- access control
- security model
- security requirements
- private key
- standard model
- chosen ciphertext
- security analysis
- public key encryption
- cca secure
- security properties
- security protocols
- security issues
- lightweight
- user authentication
- signature scheme
- blind signature scheme
- encryption key
- hash functions