ElGamal encryption

Results: 138



#Item
81Oblivious transfer / ElGamal encryption / Digital signature / Cipher / Alice and Bob / XTR / Cryptography / Public-key cryptography / Cryptographic protocols

A Note on the Bellare-Rivest Protocol for Translucent Cryptography Zhengjun Cao1 , Lihua Liu2,∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-03 22:54:21
82RSA / Malleability / Key encapsulation / ElGamal encryption / Symmetric-key algorithm / Cipher / Homomorphic encryption / Semantic security / Integrated Encryption Scheme / Cryptography / Ciphertext indistinguishability / Deniable encryption

How to Use Indistinguishability Obfuscation: Deniable Encryption, and More Amit Sahai UCLA [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-02-17 11:11:00
83XTR / Homomorphic encryption / ElGamal encryption / Internet privacy / Cryptography / Mathematics / Computer security / Public-key cryptography / Cyberwarfare / RSA

Techniques for Policy Enforcement on Encrypted Network Traffic Y. Sinan Hanay and Tilman Wolf Department of Electrical and Computer Engineering University of Massachusetts, Amherst, MA, USA {hanay,wolf}@ecs.umass.edu

Add to Reading List

Source URL: www.ecs.umass.edu

Language: English - Date: 2013-12-04 11:29:34
84Secure communication / Cryptographic protocols / Ciphertext / Malleability / RSA / ElGamal encryption / One-time pad / Transport Layer Security / Chosen-ciphertext attack / Cryptography / Electronic commerce / Public-key cryptography

Yale University Department of Computer Science Proactively Accountable Anonymous Messaging in Verdict Henry Corrigan-Gibbs David Isaac Wolinsky

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2013-06-28 11:34:07
85Secure communication / Ciphertext / Malleability / RSA / ElGamal encryption / One-time pad / Transport Layer Security / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Cryptography / Electronic commerce / Public-key cryptography

Proactively Accountable Anonymous Messaging in Verdict Henry Corrigan-Gibbs, David Isaac Wolinsky, and Bryan Ford Yale University Abstract

Add to Reading List

Source URL: dedis.cs.yale.edu

Language: English - Date: 2013-06-26 19:19:46
86Applied mathematics / Security / ID-based encryption / RSA / ElGamal encryption / Cipher / Advantage / Cryptography / Public-key cryptography / Cyberwarfare

CBE from CL-PKE: A Generic Construction and Efficient Schemes Sattam S. Al-Riyami and Kenneth G. Paterson Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX,

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2004-11-08 04:27:00
87Operator theory / XTR / Commitment scheme / Entropy / ElGamal encryption / Representation theory of finite groups / Cryptography / Finite fields / Information theory

On Continual Leakage of Discrete Log Representations Shweta Agrawal∗ Yevgeniy Dodis† Vinod Vaikuntanathan‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-06-28 14:17:56
88Electronic commerce / Homomorphic encryption / ElGamal encryption / Learning with errors / Threshold cryptosystem / RSA / Semantic security / Secure multi-party computation / Cipher / Cryptography / Public-key cryptography / Cryptographic protocols

Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE Gilad Asharov∗ Abhishek Jain†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-06-11 13:30:56
89Semantic security / RSA / Feistel cipher / ElGamal encryption / Proxy re-encryption / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Homomorphic encryption

Functional Re-encryption and Collusion-Resistant Obfuscation Nishanth Chandran∗ Microsoft Research Melissa Chase† Microsoft Research

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-04-17 12:26:57
90Cramer–Shoup cryptosystem / Malleability / Optimal asymmetric encryption padding / ElGamal encryption / Chosen-plaintext attack / RSA / Cipher / Adaptive chosen-ciphertext attack / Entropic security / Cryptography / Ciphertext indistinguishability / Semantic security

Relations Among Notions of Non-Malleability for Encryption Rafael Pass1, abhi shelat2 , and Vinod Vaikuntanathan3 1 2

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:24:56
UPDATE