Ciphertext indistinguishability

Results: 264



#Item
181Electronic commerce / Chosen-ciphertext attack / Advantage / Ciphertext / Symbol / Key encapsulation / RSA / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Simulation-based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms ? Shengli Liu1 and Kenneth G. Paterson2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-10 02:49:11
182Proof of knowledge / Mathematical proof / Zero-knowledge proof / Malleability / Ciphertext indistinguishability / Information / Knowledge / Cryptography / Cryptographic protocols / Mathematics

Succinct Malleable NIZKs and an Application to Compact Shuffles Melissa Chase Microsoft Research Redmond [removed] Markulf Kohlweiss

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2014-09-03 04:48:04
183Applied mathematics / Learning with errors / Public-key cryptography / Cipher / Mathematics / Technology / Cryptography / Ciphertext indistinguishability / RSA

Full version of an extended abstract published in Proceedings of PKC 2013, Springer-Verlag, 2013. Available from the IACR Cryptology ePrint Archive as Report[removed]Verifiable Elections That Scale for Free Melissa Cha

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2014-09-03 04:47:58
184Malleability / Locally decodable code / Forward error correction / Ciphertext indistinguishability / Code / Mathematics / Information / Telecommunications engineering / Error detection and correction / Cryptography / Coding theory

Locally Decodable and Updatable Non-Malleable Codes and Their Applications Dana Dachman-Soled University of Maryland [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-25 09:13:58
185Random oracle / HMAC / Collision resistance / Optimal asymmetric encryption padding / Hash function / Preimage attack / Collision / Ciphertext indistinguishability / SWIFFT / Cryptography / Cryptographic hash functions / Hashing

X-Sieve: CMU Sieve 2.2 From: "Ron Steinfeld" To: Subject: Hash Algorithm Requirements and Evaluation Criteria Date: Fri, 27 Apr 2007 19:41:48 +1000 X-Mailer: Microsoft Outloo

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 11:02:04
186ID-based encryption / Cipher / Adaptive chosen-ciphertext attack / Semantic security / Cryptography / Ciphertext indistinguishability / RSA

Fully Secure Functional Encryption without Obfuscation Sanjam Garg∗ Craig Gentry† Shai Halevi‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-11-12 08:24:27
187McEliece cryptosystem / Post-quantum cryptography / Semantic security / Chosen-ciphertext attack / Cryptanalysis / Cryptographic hash function / Ciphertext / Niederreiter cryptosystem / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Electronic commerce

A note on CCA2-protected McEliece cryptosystem with a systematic public key Pavol Zajac? UIM FEI STU, Ilkovicova 3, 81219 Bratislava, Slovakia [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-22 04:29:49
188Ciphertext indistinguishability / Voronoi diagram / Chosen-plaintext attack / Cryptography / Homomorphic encryption / RSA

Secure Nearest Neighbor Revisited Bin Yao1 , Feifei Li2 , Xiaokui Xiao3 1 Department of Computer Science and Engineering, Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, China

Add to Reading List

Source URL: www.cs.utah.edu

Language: English - Date: 2013-07-08 15:39:55
189RSA / Malleability / Key encapsulation / ElGamal encryption / Symmetric-key algorithm / Cipher / Homomorphic encryption / Semantic security / Integrated Encryption Scheme / Cryptography / Ciphertext indistinguishability / Deniable encryption

How to Use Indistinguishability Obfuscation: Deniable Encryption, and More Amit Sahai UCLA [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-02-17 11:11:00
190Obfuscation / Obfuscated code / Homomorphic encryption / Zero-knowledge proof / RSA / ID-based encryption / Encryption / Cryptography / Ciphertext indistinguishability / Semantic security

Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits Sanjam Garg UCLA [removed] Mariana Raykova

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-07-21 10:06:46
UPDATE