Ciphertext indistinguishability

Results: 264



#Item
121Cipher / XTR / Key / Cryptography / Ciphertext indistinguishability / Public-key cryptography

Efficient Provably-Secure Hierarchical Key Assignment Schemes Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci Dipartimento di Informatica ed Applicazioni, Universit`a di Salerno, 84084 Fisciano (SA), Italy {ads

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-01-03 13:15:33
122Cyberwarfare / Applied mathematics / Lattice-based cryptography / Lattice / RSA / Ciphertext indistinguishability / Ideal lattice cryptography / Cryptography / Mathematics / Learning with errors

Better Key Sizes (and Attacks) for LWE-Based Encryption Richard Lindner∗ Chris Peikert†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-11-30 13:28:50
123Learning with errors / Machine learning / Ciphertext indistinguishability / RSA / Cyberwarfare / Applied mathematics / Security / Cryptography / Public-key cryptography / Electronic commerce

How Practical is Public-Key Encryption Based on LPN and Ring-LPN? Ivan Damg˚ ard1 and Sunoo Park2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-04-21 15:54:23
124Advantage / Semantic security / XTR / Cyberwarfare / Security / Applied mathematics / Cryptography / ID-based encryption / Ciphertext indistinguishability

1 Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack Peng Xu and Hai Jin, Senior Member, IEEE

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-08-22 03:22:56
125Semantic security / Deterministic encryption / RSA / ElGamal encryption / Advantage / Cipher / Ciphertext indistinguishability / Plaintext-aware encryption / Cryptography / Public-key cryptography / Electronic commerce

Message-Locked Encryption for Lock-Dependent Messages Mart´ın Abadi1,3 , Dan Boneh2,? , Ilya Mironov1 , Ananth Raghunathan2,?,?? , and Gil Segev2,?,?? 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-07 11:56:24
126ElGamal encryption / RSA / Advantage / Chosen-ciphertext attack / Chosen-plaintext attack / ID-based encryption / Cipher / Ciphertext indistinguishability / Ciphertext stealing / Cryptography / Public-key cryptography / Proxy re-encryption

Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings∗ Jian Weng1,2 , Robert H. Deng1 , Shengli Liu3 , Kefei Chen3 , Junzuo Lai3 , Xu An Wang4 1 School of Information Systems, Singapore Management University,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-05-04 02:53:48
127Ciphertext indistinguishability / Perfect forward secrecy / Authentication protocol / Cryptography / Cryptographic protocols / Public-key cryptography

Enhancing CK-Model for Key Compromise Impersonation Resilience and Identity-based Key Exchange Robert W. Zhu, Xiaojian Tian, and Duncan S. Wong Department of Computer Science City University of Hong Kong

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-06-13 00:19:02
128RSA / Advantage / XTR / Random oracle / Probabilistic encryption / Cryptography / Optimal asymmetric encryption padding / Ciphertext indistinguishability

Fully Automated Analysis of Padding-Based Encryption in the Computational Model ´sar Kunz, Benedikt Schmidt∗ Gilles Barthe, Juan Manuel Crespo, Ce ´goire† Benjamin Gre

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-07-03 12:04:07
129Chosen-ciphertext attack / Malleability / Advantage / Cramer–Shoup cryptosystem / Steganography / Ciphertext / Adaptive chosen-ciphertext attack / Cryptosystem / Cipher / Cryptography / Ciphertext indistinguishability / Semantic security

Public-Key Steganography with Active Attacks Michael Backes Christian Cachin IBM Research

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-08-26 15:47:29
130Source code / Ciphertext indistinguishability / Semantic security / Random oracle / Public-key cryptography / Advantage / Hardware obfuscation / Cryptography / Obfuscation / Obfuscated code

Obfuscation for Cryptographic Purposes Dennis Hofheinz1 , John Malone-Lee2 , and Martijn Stam3 1 2 CWI, Amsterdam,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-03-08 09:17:59
UPDATE