Key-agreement protocolsCryptosystemsDigital signaturesAsymmetric-key cryptographydata securitydata availabilityanonymityone-wayness of asymmetric encryptionLegend Security PropertiesSecurityPropertydependsOnasymmetric key unbreakabilityasymmetric key unbreakabilityciphertext indistinguishabilityreal-or-random securitydata confidentialitycontrol flow integritydata integritydata confidentialitydata authenticitydata freshnessdata confidentialitynon-repudiationdata authenticitysystem availabilityforward anonymitysemantic securitynon-malleabilitynon-interferencenon-malleabilitysystem integrityforward secrecypseudonymityunforgeabilitydata retentionuser identityuser privacy