Back to Results
First PageMeta Content
Chosen-ciphertext attack / ElGamal encryption / Advantage / Chosen-plaintext attack / Hybrid cryptosystem / Integrated Encryption Scheme / Ciphertext / Cipher / RSA / Cryptography / Ciphertext indistinguishability / Adaptive chosen-ciphertext attack


Weak adaptive chosen ciphertext secure hybrid encryption scheme Xianhui Lu1 , Xuejia Lai2 , Dake He1 , Guomin Li1 Email: 1:School of Information Science & Technology, SWJTU, Chengdu, China 2:Dept. of C
Add to Reading List

Document Date: 2007-12-13 02:28:12


Open Document

File Size: 157,99 KB

Share Result on Facebook

City

Chengdu / Shanghai / /

Company

Oracle / /

Country

China / /

/

Event

FDA Phase / /

IndustryTerm

generation algorithm / dual-hash device / hybrid encryption algorithms / probabilistic algorithm / probabilistic polynomial-time algorithm / polynomial-time decryption algorithm / probabilistic polynomial-time key generation algorithm / decryption algorithm / probabilistic polynomial-time encryption algorithm / polynomial-time encryption algorithm / encryption algorithm / /

Organization

School of Information Science & Technology / /

Position

ODH IND-CPA / /

Product

KM04 / /

ProvinceOrState

Saskatchewan / /

PublishedMedium

IEEE Transactions on Information Theory / /

Technology

encryption / cryptography / secure hybrid encryption / key generation algorithm / Public key / kurosawa-Desmedt hybrid encryption / encryption algorithm / 4.2 Encryption / probabilistic polynomial-time encryption algorithm / hybrid encryption / 2.3 Hybrid Encryption / block cipher / probabilistic polynomial-time key generation algorithm / private key / secret key / deterministic / polynomial-time decryption algorithm / probabilistic polynomial-time algorithm / simulation / underlying symmetric-key encryption / decryption algorithm / following algorithms / deterministic / polynomial-time encryption algorithm / probabilistic algorithm / hybrid encryption algorithms / two algorithms / /

SocialTag