Back to Results
First PageMeta Content
ID-based encryption / RSA / Optimal asymmetric encryption padding / ElGamal encryption / Paillier cryptosystem / Homomorphic encryption / Block cipher modes of operation / Ciphertext indistinguishability / Digital signature / Cryptography / Public-key cryptography / Cramer–Shoup cryptosystem


Noname manuscript No. (will be inserted by the editor) Charm: A Framework for Rapidly Prototyping Cryptosystems Joseph A. Akinyele · Christina Garman · Ian Miers · Matthew W. Pagano · Michael Rushanan · Matthew Gree
Add to Reading List

Document Date: 2013-01-28 17:13:20


Open Document

File Size: 1,76 MB

Share Result on Facebook

City

Signature Identity / Fuzzy Identity / /

Company

AES / Type Setting Comp / CBC / Hess / /

/

Facility

SCHEMES A library / TOOLBOX Extensible library / PBC library / Johns Hopkins University / /

IndustryTerm

network communications / x1 x2 algorithm / remaining algorithms / non-interactive protocol / sub-protocols / executable honest-verifier protocol / =the g1 / ifdecryption algorithm / decryption algorithm / real world systems / privacy-preserving protocols / practice network protocols / cryptographic algorithm / description decryption algorithm / exhaustive search / legacy applications / extraction algorithm / Σ-protocols / cryptographic protocols / cryptographic systems / cryptographic algorithms / decryption algorithms / interactive protocol / thealgorithm decryption algorithm / wire protocols / larger protocol / encryption algorithm / /

Organization

Server party / Johns Hopkins University / Aviel D. Rubin Department of Computer Science / European Union / /

Person

Joseph A. Akinyele / Matthew W. Pagano / Michael Rushanan / Matthew Green / Ian Miers / Christina Garman / /

Position

editor / interpreter / IND-CPA / CPA / computational model / and performance characteristics / IND-sID-CPA / custom interpreter / secdef=IND_ID_CPA / least IND-ID-CPA / programmer / INDID-CPA / /

Product

Python interface / Python/C / Python/C Modules / Python / /

ProgrammingLanguage

EC / C / Python / C++ / /

Technology

alpha / object-oriented programming / executable honest-verifier protocol / privacy-preserving protocols / DFA-based Functional Encryption / remaining algorithms / u2Decryption CS98 Encryption / encryption algorithm / API / Public-Key Encryption Identity-Based Encryption Identity-Based Encryption Identity-Based Encryption / 2 Encryption / 28 16 24 29 47 Protocols / Block Cipher / identity-based encryption / private key / 5 Encryption / 8 description decryption algorithm / 4.2 Protocol / decryption algorithms / Public-Key Encryption Public-Key Encryption Public-Key Encryption Identity-Based Encryption / Identity-Based Encryption Identity-Based Encryption Identity-Based Encryption Identity-Based Encryption / 1 2 decryption algorithm / algorithm Zq Encryption / wire protocols / Fuzzy Identity-Based Encryption Attribute-Based Encryption Attribute-Based Encryption MA Attribute-Based Encryption / machine-generated Protocol / practice network protocols / attribute-based encryption / cryptographic algorithm / encryption / Model Lines Encryption Public-Key Encryption Public-Key Encryption Public-Key Encryption / base protocol / cryptography / larger protocol / public key / Executing protocols / public-key encryption / thealgorithm decryption algorithm / Succinct Cryptographic Protocols / Public-Key Encryption Public-Key Encryption Public-Key Encryption Public-Key Encryption / generated Protocol / IBE key extraction algorithm / http / x1 x2 algorithm / decryption algorithm / ifdecryption algorithm / Public-Key Encryption Public-Key Encryption Identity-Based Encryption Identity-Based Encryption / 1 1 2 2 Encryption / non-interactive protocol / /

URL

http /

SocialTag