Ciphertext indistinguishability

Results: 264



#Item
31Cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack / Ciphertext / RSA / Encryption / Cipher / Semantic security / Authenticated encryption

A preliminary version of this paper appears in Advances in Cryptology - EUROCRYPT ’12 Proceedings. Lecture Notes in Computer Science, Vol. 7237, pp. 682–699, Pointcheval, D.; Johansson T. eds., Springer, 2012. This i

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-02-17 07:57:12
32Cryptography / Identity-based cryptography / Public-key cryptography / Elliptic curve cryptography / Pairing-based cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack / ID-based encryption / Advantage / Encryption / BonehFranklin scheme / Ciphertext

Boneh-Franklin Identity Based Encryption Revisited David Galindo Institute for Computing and Information Sciences Radboud University Nijmegen P.O.BoxGL, Nijmegen, The Netherlands.

Add to Reading List

Source URL: www.dgalindo.es

Language: English - Date: 2007-11-26 10:35:37
33Cryptography / Public-key cryptography / Paillier cryptosystem / Homomorphic encryption / Ciphertext indistinguishability / Encryption / Malleability / Mental poker

Sorting and Searching Behind the Curtain Foteini Baldimtsi1 and Olga Ohrimenko2 1 Boston University, USA and University of Athens, Greece {} 2

Add to Reading List

Source URL: fc15.ifca.ai

Language: English - Date: 2015-01-11 00:33:27
34Cryptography / Post-quantum cryptography / Lattice-based cryptography / Homeomorphisms / Homomorphic encryption / Public-key cryptography / Key-recovery attack / NTRU / RSA / Ciphertext indistinguishability / Ideal lattice cryptography

Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes Massimo Chenal Qiang Tang

Add to Reading List

Source URL: isc2015.item.ntnu.no

Language: English - Date: 2015-09-20 14:16:36
35Cryptography / Public-key cryptography / Probabilistic encryption / Deterministic encryption / Encryption / Ciphertext indistinguishability / Database encryption / Tiny Encryption Algorithm / RSA / Advantage / Data Encryption Standard / Homomorphic encryption

Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits Omar Chowdhury Deepak Garg

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-02-12 12:31:57
36Cryptography / Ciphertext indistinguishability / Paillier cryptosystem / Probabilistic encryption / CramerShoup cryptosystem / ElGamal encryption / Chosen-ciphertext attack / Cryptosystem / Advantage / Trapdoor function / Feistel cipher / RSA

Easy Verifiable Primitives and Practical Public Key Cryptosystems David Galindo, Sebasti`a Mart´ın, Paz Morillo and Jorge L. Villar Dep. Matem` atica Aplicada IV. Universitat Polit`ecnica de Catalunya Campus Nord, c/Jo

Add to Reading List

Source URL: www.dgalindo.es

Language: English - Date: 2007-11-26 10:35:45
37

Relaxing IND-CCA: Indistinguishability Against Chosen Ciphertext Verification Attack Sumit Kumar Pandey, Santanu Sarkar and Mahavir Prasad Jhanwar CR Rao AIMSCS Hyderabad

Add to Reading List

Source URL: cse.iitkgp.ac.in

Language: English - Date: 2013-10-16 11:27:05
    38Cryptographic protocols / Secure communication / Internet protocols / Transport Layer Security / Network protocols / Transmission Control Protocol / HTTPS / Ciphertext indistinguishability / Initialization vector / Hypertext Transfer Protocol / Block cipher mode of operation / Keystream

    This paper appeared in Proceedings of the 23rd USENIX Security Symposium, AugustTapDance: End-to-Middle Anticensorship without Flow Blocking Eric Wustrow University of Michigan

    Add to Reading List

    Source URL: jhalderm.com

    Language: English - Date: 2015-11-02 11:01:00
    39Cryptography / Authentication protocols / Computer network security / Ciphertext indistinguishability / DolevYao model / Advantage / Kerberos / Cryptographic protocol / Security parameter / XTR / Challengeresponse authentication / Security protocol notation

    Inductive Proof Method for Computational Secrecy Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell Department of Computer Science, Stanford University Abstract. We investigate inductive methods for proving secrecy p

    Add to Reading List

    Source URL: seclab.stanford.edu

    Language: English - Date: 2010-07-17 01:14:15
    UPDATE