Back to Results
First PageMeta Content
Cramer–Shoup cryptosystem / XTR / Symbol / Universal hashing / Applied mathematics / Mathematics / Artificial intelligence / Finite fields / Ciphertext indistinguishability / Cryptography


Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing? Baodong Qin1,2 and Shengli Liu1,?? 1. Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 20
Add to Reading List

Document Date: 2015-03-23 10:03:04


Open Document

File Size: 415,30 KB

Share Result on Facebook

Company

Gp / Gq / Refined Subgroup / /

Country

China / /

/

Facility

College of Computer Science / Southwest University of Science / Shanghai Jiao Tong University / /

IndustryTerm

generation algorithm / randomized encryption algorithm / direct product / cyclic / finite commutative multiplicative / universal hash proof systems / hash proof systems / /

Organization

National Natural Science Foundation of China / Shanghai Education Committee / Southwest University of Science and Technology / Specialized Research Fund for the Doctoral Program of Higher Education / B. Qin and S. Liu Organization / Department of Computer Science and Engineering / Shanghai Jiao Tong University / Shanghai / College of Computer Science and Technology / /

Position

randomness extractor / random extractor / LR-CPA / /

ProgrammingLanguage

K / /

ProvinceOrState

Saskatchewan / /

Technology

Encryption / Cryptography / PPT algorithm / public key / generation algorithm / Public-key encryption / CCA-secure Public-Key Encryption / randomized encryption algorithm / symmetric-key encryption / identity-based encryption / Dom / secret key / PPT algorithms / three PPT algorithms / /

SocialTag