<--- Back to Details
First PageDocument Content
Claw-free permutation / Goldwasser–Micali cryptosystem / One-way function / Probabilistic encryption / ElGamal encryption / Polynomial / XTR / Ideal lattice cryptography / Paillier cryptosystem / Cryptography / Homomorphic encryption / Commitment scheme
Date: 2005-05-15 21:11:58
Claw-free permutation
Goldwasser–Micali cryptosystem
One-way function
Probabilistic encryption
ElGamal encryption
Polynomial
XTR
Ideal lattice cryptography
Paillier cryptosystem
Cryptography
Homomorphic encryption
Commitment scheme

Add to Reading List

Source URL: www.cs.ucla.edu

Download Document from Source Website

File Size: 166,67 KB

Share Document on Facebook

Similar Documents

Cryptography / Public-key cryptography / Commitment scheme / Secret sharing / Zero-knowledge proof / Cryptographic hash function / Coin flipping / Universal composability / Cryptographic primitive / One-way function / Claw-free permutation / RSA

Very-efficient simulatable flipping of many coins into a well (and a new very-efficient extractable-and-equivocable commitment scheme) Luís T. A. N. Brandão∗ (Technical report – June 28, Abstract. Secure two

DocID: 1lbHc - View Document

Cryptography / Cryptographic hash functions / Search algorithms / Hashing / Revenue stamps / Error detection and correction / Hash function / Digital signature / Universal one-way hash function / Claw-free permutation / E-stamping

How to Time-Stamp a Digital Document Stuart Haber W. Scott Stornetta

DocID: 1kHPS - View Document

GMR / Claw-free permutation / Digital signature / One-way function / Goldwasser–Micali cryptosystem / Silvio Micali / Quadratic residue / RSA / Binary tree / Cryptography / Public-key cryptography / Electronic commerce

Appeared in Advances in Cryptology { Crypto `86 (Proceedings), (A.M. Odlyzko ed.), Lecture Note in Computer ScienceSpringer Verlag, pages 104{110, 1987. Two Remarks Concerning the Goldwasser-Micali-Rivest Signatur

DocID: 18rkR - View Document

Error detection and correction / Search algorithms / Hash function / MD5 / Collision / SHA-1 / Hash list / Claw-free permutation / Collision attack / Cryptographic hash functions / Cryptography / Hashing

Secure Names for Bit-Strings Stuart Haber* W. Scott Stornetta*

DocID: 16K7v - View Document

Cryptographic protocols / Trapdoor function / Claw-free permutation / One-way function / Zero-knowledge proof / XTR / Mercurial / Permutation / Communications protocol / Cryptography / Public-key cryptography / Commitment scheme

Minimal Assumptions for Efficient Mercurial Commitments∗ Yevgeniy Dodis† Abstract Mercurial commitments were introduced by Chase et al. [8] and form a key building block for constructing zero-knowledge sets (introduc

DocID: 12WwO - View Document