Ciphertext indistinguishability

Results: 264



#Item
171Espionage / Security / Ciphertext indistinguishability / Ciphertext / RSA / Cipher / Known-plaintext attack / Adaptive chosen-ciphertext attack / Semantic security / Cryptography / Public-key cryptography / Cyberwarfare

Revisiting the Security Model for Timed-Release Encryption with Pre-Open Capability Alexander W. Dent1 and Qiang Tang1,2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-06-28 10:39:30
172Malleability / Chosen-ciphertext attack / Key encapsulation / Advantage / Public-key cryptography / Hybrid cryptosystem / RSA / Ciphertext / Adaptive chosen-ciphertext attack / Cryptography / Ciphertext indistinguishability / Cramer–Shoup cryptosystem

KEM/DEM: Necessary and Sufficient Conditions for Secure Hybrid Encryption Javier Herranz Dennis Hofheinz

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-08-08 09:12:18
173Ciphertext indistinguishability / Semantic security / Adaptive chosen-ciphertext attack / RSA / Chosen-ciphertext attack / Ciphertext / Probabilistic encryption / Hybrid cryptosystem / Paillier cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems Rafael Dowsley1 , Goichiro Hanaoka2 Hideki Imai2 , Anderson C. A. Nascimento1 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-06-08 17:57:32
174ID-based encryption / Semantic security / Chosen-plaintext attack / RSA / Advantage / Boneh/Franklin scheme / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / GMR / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions∗ Yang Cui1 , Eiichiro Fujisaki2 , Goichiro Hanaoka1 , Hideki Imai1,3 and Rui Zhang1 1 National Institute of Advanced Ind

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-10 22:37:01
175Structure / Group signature / Random oracle / Ciphertext indistinguishability / Model theory / Oracle machine / Undeniable signature / Blind signature / Cryptography / Ring signature / Digital signature

(Convertible) Undeniable Signatures without Random Oracles Tsz Hon Yuen1 , Man Ho Au1 , Joseph K. Liu2 , and Willy Susilo1 1 Centre for Computer and Information Security Research

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-09-24 21:57:54
176Electronic commerce / Ciphertext indistinguishability / RSA / Semantic security / Cipher / ID-based cryptography / Key / Public key infrastructure / Symmetric-key algorithm / Cryptography / Public-key cryptography / Key management

Certificateless Public Key Cryptography Sattam S. Al-Riyami and Kenneth G. Paterson∗ Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX [removed]

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
177Applied mathematics / Quantum information science / Ciphertext indistinguishability / Identical particles / Quantum computer / Qubit / Density matrix / Quantum operation / Physics / Theoretical computer science / Quantum mechanics

Quantum computational indistinguishability and zero-knowledge John Watrous School of Compupter Science and Institute for Quantum Computing

Add to Reading List

Source URL: www.fields.utoronto.ca

Language: English - Date: 2006-10-10 16:07:17
178Ciphertext indistinguishability / Semantic security / Advantage / Malleability / Chosen-ciphertext attack / Plaintext-aware encryption / Adaptive chosen-ciphertext attack / Ciphertext / Chosen-plaintext attack / Cryptography / Public-key cryptography / Optimal asymmetric encryption padding

Chosen-Ciphertext Security without Redundancy Duong Hieu Phan and David Pointcheval ´ Ecole normale sup´erieure – D´ept d’informatique

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
179ElGamal encryption / ID-based encryption / Cipher / Chosen-plaintext attack / RSA / Proxy re-encryption / Integrated Encryption Scheme / Cryptography / Ciphertext indistinguishability / Semantic security

Simple Functional Encryption Schemes for Inner Products Michel Abdalla, Florian Bourse, Angelo De Caro, and David Pointcheval ´ D´epartement d’Informatique, Ecole normale sup´erieure

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-10 08:30:29
180Ciphertext / RSA / Learning with errors / Probabilistic encryption / Four-square cipher / Cryptography / Homomorphic encryption / Ciphertext indistinguishability

Predicate Encryption for Circuits from LWE Sergey Gorbunov∗ MIT Vinod Vaikuntanathan† MIT

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-13 11:54:01
UPDATE