Back to Results
First PageMeta Content
Ciphertext indistinguishability / Semantic security / RSA / Hybrid cryptosystem / Adaptive chosen-ciphertext attack / Public-key cryptography / Chosen-ciphertext attack / Key / Cipher / Cryptography / Key encapsulation / ID-based encryption


Secure Cryptographic Workflow in the Standard Model M. Barbosa1 and P. Farshim2 1 2
Add to Reading List

Document Date: 2006-11-28 08:58:14


Open Document

File Size: 268,39 KB

Share Result on Facebook

City

Braga / Bristol / /

Country

Portugal / United Kingdom / /

/

Facility

building WF-KEMs / University of Bristol / Merchant Venturers Building / Building Blocks / /

IndustryTerm

hidden credential systems / deterministic decapsulation algorithm / generation algorithm / polynomial time algorithms / probabilistic key generation algorithm / probabilistic key encapsulation algorithm / deterministic decryption algorithm / probabilistic credential extraction algorithm / probabilistic secret sharing algorithm / decryption algorithm / probabilistic authority key generation algorithm / This algorithm / extra user key generation algorithm / deterministic verification algorithm / deterministic secret reconstruction algorithm / private key extraction algorithm / probabilistic encapsulation algorithm / signature algorithm / encryption algorithm / /

Organization

A PPT / Department of Computer Science / University of Bristol / Home Office / British Council / Universidade do Minho / /

Position

CPA / /

Product

Franklin / /

ProvinceOrState

Saskatchewan / /

Technology

deterministic decapsulation algorithm / This algorithm / PPT private key extraction algorithm / extra user key generation algorithm / encryption algorithm / 3.1 Public-Key Encryption / signature algorithm / identity-based encryption / one-time secret-key encryption / private key / secret key / deterministic secret reconstruction algorithm / PPT algorithms / probabilistic key encapsulation algorithm / probabilistic key generation algorithm / probabilistic encapsulation algorithm / probabilistic credential extraction algorithm / three PT algorithms / probabilistic authority key generation algorithm / encryption / cryptography / deterministic verification algorithm / PPT algorithm / PPT encryption algorithm / probabilistic secret sharing algorithm / key generation algorithm / public key / deterministic decryption algorithm / public-key encryption / 3.3 Identity-Based Encryption / five PT algorithms / four polynomial time algorithms / decryption algorithm / /

SocialTag