Cited By
View all- Focardi RLuccio FSteel G(2011)An introduction to security API analysisFoundations of security analysis and design VI10.5555/2028200.2028203(35-65)Online publication date: 1-Jan-2011
Affine message authentication code (MAC) and delegatable affine MAC turn out to be useful tools for constructing identity-based encryption (IBE) and hierarchical IBE (HIBE), as shown in Blazy, Kiltz and Pan's (BKP) creative work in CRYPTO (2014). An ...
In homomorphic encryption schemes, anyone can perform homomorphic operations, and therefore, it is difficult to manage when, where and by whom they are performed. In addition, the property that anyone can "freely" perform the operation inevitably means ...
Recently, much attention has been focused on designing provably secure cryptographic scheme in the presence of key leakage, and many constructions are proposed by cryptography researchers. However, most of them are researched in the bounded-leakage ...
IEEE Educational Activities Department
United States