Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication.
Hirokazu KobayashiYohei WatanabeKazuhiko MinematsuJunji ShikataPublished in: Des. Codes Cryptogr. (2023)
Keyphrases
- lower bound
- worst case
- upper bound
- optimal solution
- optimal cost
- branch and bound algorithm
- branch and bound
- lower and upper bounds
- image authentication
- np hard
- objective function
- identity authentication
- data encryption
- security analysis
- public key cryptography
- encryption decryption
- vc dimension
- linear programming relaxation
- wireless networks
- secure communication