Chosen-ciphertext attack

Results: 243



#Item
131Malleability / Chosen-ciphertext attack / Key encapsulation / Advantage / Public-key cryptography / Hybrid cryptosystem / RSA / Ciphertext / Adaptive chosen-ciphertext attack / Cryptography / Ciphertext indistinguishability / Cramer–Shoup cryptosystem

KEM/DEM: Necessary and Sufficient Conditions for Secure Hybrid Encryption Javier Herranz Dennis Hofheinz

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-08-08 09:12:18
132Ciphertext indistinguishability / Semantic security / Adaptive chosen-ciphertext attack / RSA / Chosen-ciphertext attack / Ciphertext / Probabilistic encryption / Hybrid cryptosystem / Paillier cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems Rafael Dowsley1 , Goichiro Hanaoka2 Hideki Imai2 , Anderson C. A. Nascimento1 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-06-08 17:57:32
133ID-based encryption / Semantic security / Chosen-plaintext attack / RSA / Advantage / Boneh/Franklin scheme / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / GMR / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions∗ Yang Cui1 , Eiichiro Fujisaki2 , Goichiro Hanaoka1 , Hideki Imai1,3 and Rui Zhang1 1 National Institute of Advanced Ind

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-10 22:37:01
134Ciphertext indistinguishability / Semantic security / Advantage / Malleability / Chosen-ciphertext attack / Plaintext-aware encryption / Adaptive chosen-ciphertext attack / Ciphertext / Chosen-plaintext attack / Cryptography / Public-key cryptography / Optimal asymmetric encryption padding

Chosen-Ciphertext Security without Redundancy Duong Hieu Phan and David Pointcheval ´ Ecole normale sup´erieure – D´ept d’informatique

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
135Adaptive chosen-ciphertext attack / Tiny Encryption Algorithm / Cryptography / Cramer–Shoup cryptosystem / Chosen-ciphertext attack

An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack† Chong Hee KIM, Yong Ho HWANG, and Pil Joong LEE IS Lab, Dept. of Electronic and Electrical Eng., POSTECH, KOREA {chhkim,

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
136ElGamal encryption / ID-based encryption / Cipher / Chosen-plaintext attack / RSA / Proxy re-encryption / Integrated Encryption Scheme / Cryptography / Ciphertext indistinguishability / Semantic security

Simple Functional Encryption Schemes for Inner Products Michel Abdalla, Florian Bourse, Angelo De Caro, and David Pointcheval ´ D´epartement d’Informatique, Ecole normale sup´erieure

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-10 08:30:29
137Electronic commerce / Chosen-ciphertext attack / Advantage / Ciphertext / Symbol / Key encapsulation / RSA / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Simulation-based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms ? Shengli Liu1 and Kenneth G. Paterson2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-10 02:49:11
138Chosen-ciphertext attack / Ciphertext / RSA / Adaptive chosen-ciphertext attack / Advantage / Paillier cryptosystem / Affine cipher / Cryptography / Homomorphic encryption / Chosen-plaintext attack

DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity Dhananjay S. Phatak,∗ Qiang Tang,† Alan T. Sherman,∗ Warren D. Smith,‡ Peter Ryan,† Kostas Kalpakis∗ April[removed]re

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-26 15:05:13
139ID-based encryption / Cipher / Adaptive chosen-ciphertext attack / Semantic security / Cryptography / Ciphertext indistinguishability / RSA

Fully Secure Functional Encryption without Obfuscation Sanjam Garg∗ Craig Gentry† Shai Halevi‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-11-12 08:24:27
140Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Advantage / Cryptography / Public-key cryptography / Signcryption

Universally Composable Secure Group Communication Youliang Tian1,2 and Changgen Peng1,2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-28 03:00:32
UPDATE