Ciphertext

Results: 697



#Item
441Ciphertext indistinguishability / Universal composability / Oblivious transfer / Common reference string model / Communications protocol / Secure multi-party computation / Cryptosystem / Cryptography / Cryptographic protocols / Public-key cryptography

A Framework for Efficient and Composable Oblivious Transfer Chris Peikert SRI International Vinod Vaikuntanathan MIT∗

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:10:06
442Semantic security / RSA / Feistel cipher / ElGamal encryption / Proxy re-encryption / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Homomorphic encryption

Functional Re-encryption and Collusion-Resistant Obfuscation Nishanth Chandran∗ Microsoft Research Melissa Chase† Microsoft Research

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-04-17 12:26:57
443Cipher / Advantage / RSA / Semantic security / Probabilistic encryption / Schmidt–Samoa cryptosystem / Cryptography / Public-key cryptography / Chosen-ciphertext attack

Searchable Keyword-Based Encryption∗ Dong Jin Park† , Juyoung Cha‡ , and Pil Joong Lee‡ † Samsung Electronics Co., Ltd., Korea [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-01-21 22:15:55
444Ciphertext indistinguishability / Secure multi-party computation / Advantage / Security parameter / Commitment / One-way function / Secret sharing / Public-key cryptography / Zero-knowledge proof / Cryptography / Cryptographic protocols / Commitment scheme

Round-Efficient Black-Box Construction of Composable Multi-Party Computation Susumu Kiyoshima NTT Secure Platform Laboratories, Japan. [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-16 19:58:40
445RSA / Chosen-plaintext attack / Ciphertext / Homomorphic encryption / Advantage / Cipher / Adaptive chosen-ciphertext attack / Plaintext-aware encryption / Cryptography / Ciphertext indistinguishability / Deterministic encryption

An Ideal-Security Protocol for Order-Preserving Encoding Raluca Ada Popa MIT CSAIL Frank H. Li MIT CSAIL

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2014-09-26 19:21:08
446XTR / One-way function / Cramer–Shoup cryptosystem / RSA / Paillier cryptosystem / Advantage / Ideal lattice cryptography / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Finite fields

Public-Key Encryption Schemes with Auxiliary Inputs Yevgeniy Dodis1? , Shafi Goldwasser2?? , Yael Kalai3 , Chris Peikert4? ? ? , and Vinod Vaikuntanathan5 1 New York University

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:08:40
447Ciphertext / Malleability / RSA / Block cipher / Optimal asymmetric encryption padding / Chosen-plaintext attack / Initialization vector / Cipher / PKCS / Cryptography / Authenticated encryption / Chosen-ciphertext attack

One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography Tibor Jager Horst G¨ortz Institute for IT Security Ruhr-University Bochum [removed]

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2013-04-11 09:39:21
448Cramer–Shoup cryptosystem / Malleability / Optimal asymmetric encryption padding / ElGamal encryption / Chosen-plaintext attack / RSA / Cipher / Adaptive chosen-ciphertext attack / Entropic security / Cryptography / Ciphertext indistinguishability / Semantic security

Relations Among Notions of Non-Malleability for Encryption Rafael Pass1, abhi shelat2 , and Vinod Vaikuntanathan3 1 2

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:24:56
449Information / Commitment scheme / Malleability / Communications protocol / Ciphertext indistinguishability / IP / Zero-knowledge proof / Proof of knowledge / Transmission Control Protocol / Cryptography / Cryptographic protocols / Data

An Algebraic Approach to Non-Malleability Vipul Goyal∗ Silas Richelson†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-27 04:52:39
450Homomorphic encryption / Electronic commerce / Ciphertext indistinguishability / Secure multi-party computation / Secret sharing / Cipher / RSA / ElGamal encryption / Semantic security / Cryptography / Public-key cryptography / Cryptographic protocols

Cloud-Assisted Multiparty Computation from Fully Homomorphic Encryption Adriana L´opez-Alt New York University Eran Tromer∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-07 16:19:48
UPDATE