Ciphertext indistinguishability

Results: 264



#Item
201Bounded CCA2-Secure Encryption Ronald Cramer1,2 , Goichiro Hanaoka3 , Dennis Hofheinz1 , Hideki Imai3,4 , Eike Kiltz1 , Rafael Pass5 , abhi shelat6 , and Vinod Vaikuntanathan7 1  3

Bounded CCA2-Secure Encryption Ronald Cramer1,2 , Goichiro Hanaoka3 , Dennis Hofheinz1 , Hideki Imai3,4 , Eike Kiltz1 , Rafael Pass5 , abhi shelat6 , and Vinod Vaikuntanathan7 1 3

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:24:49
202Construction of a Non-Malleable Encryption Scheme from Any Semantically Secure One Rafael Pass1 , abhi shelat2 , and Vinod Vaikuntanathan3 1  Cornell University

Construction of a Non-Malleable Encryption Scheme from Any Semantically Secure One Rafael Pass1 , abhi shelat2 , and Vinod Vaikuntanathan3 1 Cornell University

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:24:17
203Functional Encryption: New Perspectives and Lower Bounds Shweta Agrawal ∗  Sergey Gorbunov†

Functional Encryption: New Perspectives and Lower Bounds Shweta Agrawal ∗ Sergey Gorbunov†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-10-01 16:31:30
204A Framework for Efficient and Composable Oblivious Transfer Chris Peikert SRI International Vinod Vaikuntanathan MIT∗

A Framework for Efficient and Composable Oblivious Transfer Chris Peikert SRI International Vinod Vaikuntanathan MIT∗

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:10:06
205Functional Re-encryption and Collusion-Resistant Obfuscation Nishanth Chandran∗ Microsoft Research Melissa Chase† Microsoft Research

Functional Re-encryption and Collusion-Resistant Obfuscation Nishanth Chandran∗ Microsoft Research Melissa Chase† Microsoft Research

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-04-17 12:26:57
206Round-Efficient Black-Box Construction of Composable Multi-Party Computation Susumu Kiyoshima NTT Secure Platform Laboratories, Japan. [removed]

Round-Efficient Black-Box Construction of Composable Multi-Party Computation Susumu Kiyoshima NTT Secure Platform Laboratories, Japan. [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-16 19:58:40
207An Ideal-Security Protocol for Order-Preserving Encoding Raluca Ada Popa MIT CSAIL Frank H. Li MIT CSAIL

An Ideal-Security Protocol for Order-Preserving Encoding Raluca Ada Popa MIT CSAIL Frank H. Li MIT CSAIL

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2014-09-26 19:21:08
208Public-Key Encryption Schemes with Auxiliary Inputs Yevgeniy Dodis1? , Shafi Goldwasser2?? , Yael Kalai3 , Chris Peikert4? ? ? , and Vinod Vaikuntanathan5 1  New York University

Public-Key Encryption Schemes with Auxiliary Inputs Yevgeniy Dodis1? , Shafi Goldwasser2?? , Yael Kalai3 , Chris Peikert4? ? ? , and Vinod Vaikuntanathan5 1 New York University

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:08:40
209Relations Among Notions of Non-Malleability for Encryption Rafael Pass1, abhi shelat2 , and Vinod Vaikuntanathan3 1 2

Relations Among Notions of Non-Malleability for Encryption Rafael Pass1, abhi shelat2 , and Vinod Vaikuntanathan3 1 2

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:24:56
210An Algebraic Approach to Non-Malleability  Vipul Goyal∗ Silas Richelson†

An Algebraic Approach to Non-Malleability Vipul Goyal∗ Silas Richelson†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-27 04:52:39