Cramer–Shoup cryptosystem

Results: 42



#Item
11Cipher / ID-based encryption / Vector space / Function / Cramer–Shoup cryptosystem / Algebra / Mathematics / Cryptography

Dual System Encryption via Predicate Encodings Hoeteck Wee⋆ ENS, Paris, France Abstract. We introduce the notion of predicate encodings, an information-theoretic primitive reminiscent of linear secret-sharing that in a

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-23 14:03:35
12Ciphertext / Cramer–Shoup cryptosystem / Chosen-plaintext attack / Semantic security / Cipher / Chosen-ciphertext attack / RSA / ElGamal encryption / Email encryption / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Privacy in Encrypted Content Distribution Using Private Broadcast Encryption Adam Barth1 , Dan Boneh?1 , and Brent Waters2 1 2

Add to Reading List

Source URL: www.adambarth.com

Language: English - Date: 2007-04-29 16:34:52
13ElGamal encryption / Chosen-ciphertext attack / Ciphertext indistinguishability / RSA / ID-based encryption / Key / Random oracle / Paillier cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / Cramer–Shoup cryptosystem

Secure Public-Key Encryption from Factorisation-Related Problems by Jaimee Brown Bachelor of Information Technology/ Bachelor of Applied Science

Add to Reading List

Source URL: eprints.qut.edu.au

Language: English - Date: 2010-06-09 09:12:09
14Cipher / Chosen-plaintext attack / Broadcast encryption / Chosen-ciphertext attack / RSA / Cramer–Shoup cryptosystem / Paillier cryptosystem / Cryptography / Public-key cryptography / Ciphertext

Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data Vipul Goyal∗ Omkant Pandey†

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2012-05-29 07:38:50
15Malleability / Adaptive chosen-ciphertext attack / Semantic security / Chosen-ciphertext attack / Chosen-plaintext attack / Advantage / Optimal asymmetric encryption padding / Cryptography / Ciphertext indistinguishability / Cramer–Shoup cryptosystem

Alternatives to Non-Malleability: Definitions, Constructions and Applications Philip MacKenzie∗ Michael K. Reiter†

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-01-02 18:28:55
16Cramer–Shoup cryptosystem / Plaintext-aware encryption / Chosen-ciphertext attack / Chosen-plaintext attack / Advantage / Ciphertext / ElGamal encryption / RSA / Cipher / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Towards Plaintext-Aware Public-Key Encryption without Random Oracles Mihir Bellare and Adriana Palacio Dept. of Computer Science & Engineering, University of California, San Diego 9500 Gilman Drive, La Jolla, CA 92093, U

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
17Semantic security / Adaptive chosen-ciphertext attack / Cramer–Shoup cryptosystem / Chosen-ciphertext attack / Advantage / Ciphertext / RSA / Cipher / Key-recovery attack / Cryptography / Signcryption / Ciphertext indistinguishability

Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt” Yang Wang1 , Mark Manulis2 , Man Ho Au1 and Willy Susilo1? 1 Centre for Computer and Information Security Research

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-04-20 21:27:06
18Malleability / Chosen-ciphertext attack / Key encapsulation / Advantage / Public-key cryptography / Hybrid cryptosystem / RSA / Ciphertext / Adaptive chosen-ciphertext attack / Cryptography / Ciphertext indistinguishability / Cramer–Shoup cryptosystem

KEM/DEM: Necessary and Sufficient Conditions for Secure Hybrid Encryption Javier Herranz Dennis Hofheinz

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-08-08 09:12:18
19Adaptive chosen-ciphertext attack / Tiny Encryption Algorithm / Cryptography / Cramer–Shoup cryptosystem / Chosen-ciphertext attack

An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack† Chong Hee KIM, Yong Ho HWANG, and Pil Joong LEE IS Lab, Dept. of Electronic and Electrical Eng., POSTECH, KOREA {chhkim,

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
20RSA / Cipher / XTR / ID-based encryption / Cramer–Shoup cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption Yannis Rouselakis1 and Brent Waters2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-10 02:06:29
UPDATE