Ciphertext

Results: 697



#Item
371Espionage / Security / Ciphertext indistinguishability / Ciphertext / RSA / Cipher / Known-plaintext attack / Adaptive chosen-ciphertext attack / Semantic security / Cryptography / Public-key cryptography / Cyberwarfare

Revisiting the Security Model for Timed-Release Encryption with Pre-Open Capability Alexander W. Dent1 and Qiang Tang1,2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-06-28 10:39:30
372Malleability / Chosen-ciphertext attack / Key encapsulation / Advantage / Public-key cryptography / Hybrid cryptosystem / RSA / Ciphertext / Adaptive chosen-ciphertext attack / Cryptography / Ciphertext indistinguishability / Cramer–Shoup cryptosystem

KEM/DEM: Necessary and Sufficient Conditions for Secure Hybrid Encryption Javier Herranz Dennis Hofheinz

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-08-08 09:12:18
373Ciphertext indistinguishability / Semantic security / Adaptive chosen-ciphertext attack / RSA / Chosen-ciphertext attack / Ciphertext / Probabilistic encryption / Hybrid cryptosystem / Paillier cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems Rafael Dowsley1 , Goichiro Hanaoka2 Hideki Imai2 , Anderson C. A. Nascimento1 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-06-08 17:57:32
374ID-based encryption / Semantic security / Chosen-plaintext attack / RSA / Advantage / Boneh/Franklin scheme / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / GMR / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions∗ Yang Cui1 , Eiichiro Fujisaki2 , Goichiro Hanaoka1 , Hideki Imai1,3 and Rui Zhang1 1 National Institute of Advanced Ind

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-10 22:37:01
375Structure / Group signature / Random oracle / Ciphertext indistinguishability / Model theory / Oracle machine / Undeniable signature / Blind signature / Cryptography / Ring signature / Digital signature

(Convertible) Undeniable Signatures without Random Oracles Tsz Hon Yuen1 , Man Ho Au1 , Joseph K. Liu2 , and Willy Susilo1 1 Centre for Computer and Information Security Research

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-09-24 21:57:54
376Electronic commerce / Ciphertext indistinguishability / RSA / Semantic security / Cipher / ID-based cryptography / Key / Public key infrastructure / Symmetric-key algorithm / Cryptography / Public-key cryptography / Key management

Certificateless Public Key Cryptography Sattam S. Al-Riyami and Kenneth G. Paterson∗ Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX [removed]

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
377Applied mathematics / Quantum information science / Ciphertext indistinguishability / Identical particles / Quantum computer / Qubit / Density matrix / Quantum operation / Physics / Theoretical computer science / Quantum mechanics

Quantum computational indistinguishability and zero-knowledge John Watrous School of Compupter Science and Institute for Quantum Computing

Add to Reading List

Source URL: www.fields.utoronto.ca

Language: English - Date: 2006-10-10 16:07:17
378Ciphertext indistinguishability / Semantic security / Advantage / Malleability / Chosen-ciphertext attack / Plaintext-aware encryption / Adaptive chosen-ciphertext attack / Ciphertext / Chosen-plaintext attack / Cryptography / Public-key cryptography / Optimal asymmetric encryption padding

Chosen-Ciphertext Security without Redundancy Duong Hieu Phan and David Pointcheval ´ Ecole normale sup´erieure – D´ept d’informatique

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
379Adaptive chosen-ciphertext attack / Tiny Encryption Algorithm / Cryptography / Cramer–Shoup cryptosystem / Chosen-ciphertext attack

An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack† Chong Hee KIM, Yong Ho HWANG, and Pil Joong LEE IS Lab, Dept. of Electronic and Electrical Eng., POSTECH, KOREA {chhkim,

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
380ElGamal encryption / ID-based encryption / Cipher / Chosen-plaintext attack / RSA / Proxy re-encryption / Integrated Encryption Scheme / Cryptography / Ciphertext indistinguishability / Semantic security

Simple Functional Encryption Schemes for Inner Products Michel Abdalla, Florian Bourse, Angelo De Caro, and David Pointcheval ´ D´epartement d’Informatique, Ecole normale sup´erieure

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-10 08:30:29
UPDATE