<--- Back to Details
First PageDocument Content
Cryptography / Computational hardness assumptions / Decisional DiffieHellman assumption / Computational DiffieHellman assumption / Decision Linear assumption / DiffieHellman problem / Learning with errors / Weight / Provable security / IP / XDH assumption / Ideal lattice cryptography
Date: 2018-02-16 15:03:09
Cryptography
Computational hardness assumptions
Decisional DiffieHellman assumption
Computational DiffieHellman assumption
Decision Linear assumption
DiffieHellman problem
Learning with errors
Weight
Provable security
IP
XDH assumption
Ideal lattice cryptography

Semantic Security Invariance under Variant Computational Assumptions Eftychios Theodorakis? and John C. Mitchell?? Abstract. A game-based cryptographic proof is a relation that establishes equivalence between probabilist

Add to Reading List

Source URL: eftychis.org

Download Document from Source Website

File Size: 634,17 KB

Share Document on Facebook

Similar Documents