Paillier cryptosystem

Results: 121



#Item
21Homomorphic encryption / Paillier cryptosystem / Deterministic encryption / HTTP Secure / ElGamal encryption / Encryption software / RSA / Cryptography / Public-key cryptography / Cryptographic software

AUTO C RYPT: Enabling Homomorphic Computation on Servers to Protect Sensitive Web Content Shruti Tople Shweta Shinde Zhaofeng Chen

Add to Reading List

Source URL: compsec.comp.nus.edu.sg

Language: English - Date: 2014-02-03 05:14:50
22Ciphertext / RSA / Cipher / Semantic security / Paillier cryptosystem / ElGamal encryption / Cryptography / Homomorphic encryption / Ciphertext indistinguishability

Two Round MPC from LWE via Multi-Key FHE Pratyay Mukherjee∗ Daniel Wichs† April 29, 2015

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-29 08:31:30
23Paillier cryptosystem / Homomorphic encryption / Goldwasser–Micali cryptosystem / Learning with errors / Oblivious transfer / RSA / XTR / ElGamal encryption / Random self-reducibility / Cryptography / Public-key cryptography / Electronic commerce

Oblivious Transfer from weakly Random Self-Reducible Public-Key Cryptosystem Claude Cr´epeau ? , Raza Ali Kazmi ?

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-21 15:33:43
24Chosen-ciphertext attack / Ciphertext / Cipher / RSA / Advantage / Malleability / Ciphertext stealing / Paillier cryptosystem / Cryptography / Authenticated encryption / Block cipher modes of operation

This is a preliminary version. The final version of this paper appears in the proceedings of CT-RSAThe final publication is available at Springer via http://dx.doi.org2_12. Format Oracles

Add to Reading List

Source URL: www.ssi.gouv.fr

Language: English - Date: 2015-05-06 09:12:34
25RSA / ElGamal encryption / XTR / Naccache–Stern cryptosystem / Homomorphic encryption / Cryptography / Public-key cryptography / Paillier cryptosystem

A Generalization of Paillier’s Public-Key System with Applications to Electronic Voting Ivan Damg˚ ard, Mads Jurik and Jesper Buus Nielsen Aarhus University, Dept. of Computer Science, BRICS?

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2004-05-13 14:06:04
26Digital signature / Key / Paillier cryptosystem / Prime number / Threshold cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / RSA

RSA Threshold Cryptography H.L. Nguyen May 4, 2005 Dept. of Computer Science, University of Bristol, Merchant Venturers Building,

Add to Reading List

Source URL: www.cs.ox.ac.uk

Language: English - Date: 2013-06-06 21:32:07
27Electronic voting / Election fraud / Electoral systems / Paillier cryptosystem / Ballot / Homomorphic encryption / Blind signature / Electoral fraud / Vote counting system / Cryptography / Politics / Elections

Receipt-Free Homomorphic Elections and Write-in Voter Verified Ballots Alessandro Acquisti April 2004 CMU-ISRI

Add to Reading List

Source URL: www.heinz.cmu.edu

Language: English - Date: 2004-05-26 11:53:01
28Homomorphic encryption / ElGamal encryption / Probabilistic encryption / Blind signature / Encryption / Ciphertext / Goldwasser–Micali cryptosystem / Cipher / Zero-knowledge proof / Cryptography / Public-key cryptography / Paillier cryptosystem

Privacy and Verifiability in Voting Systems: Methods, Developments and Trends Hugo Jonkera,∗ , Sjouke Mauwa,b , Jun Panga a University of Luxembourg, Faculty of Sciences, Technology and Communication

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-09-25 07:33:00
29ICE / Crypt / Advanced Encryption Standard / Cipher / Paillier cryptosystem / Khufu and Khafre / Cryptography / Chosen-plaintext attack / Ciphertext

Cryptanalysis of Magenta Eli Biham, Alex Biryukov, Niels Ferguson, Lars R. Knudsen, Bruce Schneier, Adi Shamir August 20, 1998 Magenta is an encryption algorithm submitted for AES by Deutsche

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
30Chosen-ciphertext attack / Paillier cryptosystem / Advantage / Chosen-plaintext attack / ElGamal encryption / ID-based encryption / Probabilistic encryption / Cipher / RSA / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Generic Constructions of Integrated PKE and PEKS Yu Chen∗ Jiang Zhang† Dongdai Lin∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-01 02:46:37
UPDATE