Cramer–Shoup cryptosystem

Results: 42



#Item
21Remarks on the Cryptographic Primitive of Attribute-based Encryption Zhengjun Cao1 , Lihua Liu2,∗

Remarks on the Cryptographic Primitive of Attribute-based Encryption Zhengjun Cao1 , Lihua Liu2,∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-15 01:22:56
22Adaptive One-way Functions and Applications Omkant Pandey1 , Rafael Pass2? , and Vinod Vaikuntanathan3?? 1 2

Adaptive One-way Functions and Applications Omkant Pandey1 , Rafael Pass2? , and Vinod Vaikuntanathan3?? 1 2

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:07:19
23Bounded CCA2-Secure Encryption Ronald Cramer1,2 , Goichiro Hanaoka3 , Dennis Hofheinz1 , Hideki Imai3,4 , Eike Kiltz1 , Rafael Pass5 , abhi shelat6 , and Vinod Vaikuntanathan7 1  3

Bounded CCA2-Secure Encryption Ronald Cramer1,2 , Goichiro Hanaoka3 , Dennis Hofheinz1 , Hideki Imai3,4 , Eike Kiltz1 , Rafael Pass5 , abhi shelat6 , and Vinod Vaikuntanathan7 1 3

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:24:49
24Public-Key Encryption Schemes with Auxiliary Inputs Yevgeniy Dodis1? , Shafi Goldwasser2?? , Yael Kalai3 , Chris Peikert4? ? ? , and Vinod Vaikuntanathan5 1  New York University

Public-Key Encryption Schemes with Auxiliary Inputs Yevgeniy Dodis1? , Shafi Goldwasser2?? , Yael Kalai3 , Chris Peikert4? ? ? , and Vinod Vaikuntanathan5 1 New York University

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:08:40
25Relations Among Notions of Non-Malleability for Encryption Rafael Pass1, abhi shelat2 , and Vinod Vaikuntanathan3 1 2

Relations Among Notions of Non-Malleability for Encryption Rafael Pass1, abhi shelat2 , and Vinod Vaikuntanathan3 1 2

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:24:56
26A Punctured Programming Approach to Adaptively Secure Functional Encryption Brent Waters∗ University of Texas at Austin [removed]

A Punctured Programming Approach to Adaptively Secure Functional Encryption Brent Waters∗ University of Texas at Austin [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-29 10:44:19
27MPRI Lecture Notes  Course 2-30 Cryptographic protocols Formal and Computational Proofs

MPRI Lecture Notes Course 2-30 Cryptographic protocols Formal and Computational Proofs

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2011-09-28 08:57:21
28Why Proving HIBE Systems Secure is Difficult Allison Lewko Brent Waters  Abstract

Why Proving HIBE Systems Secure is Difficult Allison Lewko Brent Waters Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-10-17 14:00:59
29New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques Brent Waters † University of Texas at Austin [removed]

New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques Brent Waters † University of Texas at Austin [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-06-08 21:20:23