Deciding the Security of Protocols with Commuting Public Key Encryption.
Yannick ChevalierRalf KüstersMichaël RusinowitchMathieu TuruaniPublished in: Electron. Notes Theor. Comput. Sci. (2005)
Keyphrases
- public key encryption
- public key
- proxy re encryption
- encryption scheme
- security protocols
- key agreement protocol
- security properties
- authentication protocol
- cryptographic protocols
- standard model
- access control
- identity based encryption
- security model
- network security
- information security
- database
- secret key
- wireless sensor networks
- data model
- distributed systems
- keywords