Back to Results
First PageMeta Content
Mental poker / Goldwasser–Micali cryptosystem / Probabilistic encryption / XTR / RSA / Block cipher modes of operation / Cipher / Paillier cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / Electronic commerce


Single-bit Re-encryption with Applications to Distributed Proof Systems Nikita Borisov Kazuhiro Minami
Add to Reading List

Document Date: 2013-01-05 00:32:20


Open Document

File Size: 601,84 KB

Share Result on Facebook

City

San Francisco / Santa Barbara / New York / Paris / Washington / DC / Berlin / Alexandria / /

Company

Access-Control Systems / Furukawa / ACM Press / Computer Communication Networks / /

Country

France / United States / /

Currency

USD / /

/

Event

FDA Phase / /

Facility

University of Illinois / Massachusetts Institute of Technology / /

IndustryTerm

randomized encryption protocol / proof construction algorithm / cryptographic protocols / online games / e-voting / multiplicative algorithm / particular key generation algorithm / computing / distributed proof systems / peer server / location server / proof systems / cryptographic protocol / /

Organization

office of Science and Technology / Massachusetts Institute of Technology / University of Illinois / Department of Homeland Security / IEEE Computer Society / /

Person

Ian Goldberg / Bob / Disjointness Testing / Alice / Ben Adida / Kazuhiro Minami / Host B (Bob) Figure / Nikita Borisov / /

Position

editor / General / author / administrator / Commutative encryption model / /

Product

To remedy / /

ProvinceOrState

Virginia / Illinois / Hawaii / New York / California / Massachusetts / /

PublishedMedium

IEEE Transactions on Information Theory / Communications of the ACM / Journal of Symbolic Computation / Journal of Cryptology / Theory of Computing / Lecture Notes in Computer Science / /

Technology

n-out-ofn threshold encryption / FIXING MK WITH COMMUTATIVE ENCRYPTION / equivalent encryption / ElGamal re-encryption / peer-to-peer / particular key generation algorithm / MK algorithm The MK algorithm / Kotz algorithm / cryptographic protocol / asymmetric encryption / Data Encryption / Minami-Kotz algorithm / alternate commutative encryptions / MK algorithm / improved algorithm / private key / bit re-encryption / encryption / port commutative/threshold encryption / Cryptography / commutative encryption / public key / 5.2 Implementing Commutative Encryption / proof construction algorithm / Mobile Computing / modified algorithm / secure re-encryption / randomized encryption protocol / modified GCD algorithm / constructed using a particular key generation algorithm / /

SocialTag