Back to Results
First PageMeta Content
Cramer–Shoup cryptosystem / Adaptive chosen-ciphertext attack / RSA / Chosen-ciphertext attack / ElGamal encryption / Semantic security / Ciphertext / Blinding / Optimal asymmetric encryption padding / Cryptography / Public-key cryptography / Ciphertext indistinguishability


Secure Blind Decryption Matthew Green Information Security Institute Johns Hopkins University 3400 N. Charles St. Baltimore, MD 21218
Add to Reading List

Document Date: 2011-03-05 12:17:37


Open Document

File Size: 407,92 KB

Share Result on Facebook

Company

R FS.KG. / FS.KG / R R LE.KG. / LE.KG / /

/

Event

FDA Phase / /

Facility

Secure Blind Decryption Matthew Green Information Security Institute Johns Hopkins University / /

IndustryTerm

distributed file systems / real-world applications / simulatable oblivious transfer protocols / generation algorithm / folklore solutions / signature verification algorithm / proof-of-knowledge protocols / inefficient gate-by-gate decryption protocols / adaptive oblivious transfer protocols / decryption algorithms / decryption algorithm / privacy-preserving protocols / proof systems / blind decryption protocol / encryption algorithm / /

Organization

Johns Hopkins University / /

Person

Matthew Green / /

/

Position

extractor / hb / knowledge extractor / /

Product

CCA2 / /

ProgrammingLanguage

C / /

ProvinceOrState

Wisconsin / /

Technology

encryption / inefficient gate-by-gate decryption protocols / adaptive k-out-of-N Oblivious Transfer protocols / simulatable oblivious transfer protocols / two-party protocol / privacy-preserving protocols / KG algorithm / key generation algorithm / public key / adaptive oblivious transfer protocols / BlindDec protocol / signing algorithm / Dec algorithm / public-key encryption / WASign algorithm / encryption algorithm / 9 The protocol / 2.3 Linear Encryption / secret key / simulation / decryption algorithm / TBE decryption algorithm / following algorithms / PIR protocol / blind decryption protocol / decryption algorithms / proof-of-knowledge protocols / Elgamal encryption / fresh encryption / signature verification algorithm / public key encryption / /

SocialTag