Ciphertext indistinguishability

Results: 264



#Item
151ID-based encryption / Cyberwarfare / Semantic security / Applied mathematics / Security / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Bilinear Pairings in Cryptography: Identity Based Encryption Dan Boneh Stanford University

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2014-05-27 15:07:17
152Advantage / Chosen-ciphertext attack / Public-key cryptography / Cipher / Chosen-plaintext attack / Encryption / Semantic security / Cryptography / Ciphertext indistinguishability / ID-based encryption

Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack Junzuo Lai⋆ , Robert H. Deng⋆⋆ , Shengli Liu⋆ ⋆ ⋆ , Jian Weng† , and Yunlei Zhao‡ Abstract. Security against selective o

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-29 21:25:11
153Cramer–Shoup cryptosystem / XTR / Symbol / Universal hashing / Applied mathematics / Mathematics / Artificial intelligence / Finite fields / Ciphertext indistinguishability / Cryptography

Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing? Baodong Qin1,2 and Shengli Liu1,?? 1. Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 20

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-23 10:03:04
154Applied mathematics / Ciphertext indistinguishability / Cipher / Semantic security / RSA / Mix network / Public-key cryptography / Encryption / ElGamal encryption / Cryptography / Cyberwarfare / Security

Security Analysis of Re-Encryption RPC Mix Nets Ralf K¨usters and Tomasz Truderung University of Trier, Germany {kuesters,truderung}@uni-trier.de Abstract. Re-Encryption randomized partial checking (RPC) mix nets were

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-29 05:22:29
155Oblivious transfer / Ciphertext indistinguishability / Verifiable computing / Cryptography / Homomorphic encryption / RSA

Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption∗ Jonathan Katz† Aishwarya Thiruvengadam‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-24 12:50:07
156Computing / System software / Degree of anonymity / Onion routing / Tor / Anonymity / Ciphertext indistinguishability / Adversary model / Internet privacy / Cryptographic software / Internet

(Nothing else) MATor(s): Monitoring the Anonymity of Tor’s Path Selection Michael Backes1,2 Aniket Kate1,3

Add to Reading List

Source URL: www.infsec.cs.uni-saarland.de

Language: English - Date: 2014-10-15 11:46:33
157ID-based encryption / Secrecy / Homomorphic encryption / Ciphertext indistinguishability / RSA / Semantic security / Cipher / Proxy re-encryption / Integrated Encryption Scheme / Cryptography / Cyberwarfare / Security

Functional Encryption from (Small) Hardware Tokens Kai-Min Chung1? , Jonathan Katz2?? , and Hong-Sheng Zhou3? ? ? 1 Academia Sinica, [removed] University of Maryland, [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-02-23 14:57:23
158Ciphertext / Cramer–Shoup cryptosystem / Chosen-plaintext attack / Semantic security / Cipher / Chosen-ciphertext attack / RSA / ElGamal encryption / Email encryption / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Privacy in Encrypted Content Distribution Using Private Broadcast Encryption Adam Barth1 , Dan Boneh?1 , and Brent Waters2 1 2

Add to Reading List

Source URL: www.adambarth.com

Language: English - Date: 2007-04-29 16:34:52
159ElGamal encryption / Chosen-ciphertext attack / Ciphertext indistinguishability / RSA / ID-based encryption / Key / Random oracle / Paillier cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / Cramer–Shoup cryptosystem

Secure Public-Key Encryption from Factorisation-Related Problems by Jaimee Brown Bachelor of Information Technology/ Bachelor of Applied Science

Add to Reading List

Source URL: eprints.qut.edu.au

Language: English - Date: 2010-06-09 09:12:09
160Password / Ciphertext indistinguishability / Dropbox / Comodo Group / Unified Extensible Firmware Interface / Crypt / Chosen-plaintext attack / Man-in-the-middle attack / Plaintext / Software / Computing / Cryptography

Security Now! #Q&A #208  This week on Security Now! ● ●

Add to Reading List

Source URL: www.grc.com

Language: English - Date: 2015-03-17 16:05:33
UPDATE