Predicate encryption against master-key tampering attacks

Abstract Many real world attacks often target the implementation of a cryptographic scheme, rather than the algorithm itself, and a system designer has to consider new models that can capture these attacks. For example, if the key can be tampered by physical attacks on the device, the security of th...

Full description

Bibliographic Details
Main Authors: Yuejun Liu, Rui Zhang, Yongbin Zhou
Format: Article
Language:English
Published: SpringerOpen 2019-08-01
Series:Cybersecurity
Subjects:
Online Access:http://link.springer.com/article/10.1186/s42400-019-0039-6