Paillier cryptosystem

Results: 121



#Item
71Ciphertext indistinguishability / Semantic security / Adaptive chosen-ciphertext attack / RSA / Chosen-ciphertext attack / Ciphertext / Probabilistic encryption / Hybrid cryptosystem / Paillier cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems Rafael Dowsley1 , Goichiro Hanaoka2 Hideki Imai2 , Anderson C. A. Nascimento1 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-06-08 17:57:32
72Homomorphic encryption / Oblivious transfer / Paillier cryptosystem / Naccache–Stern cryptosystem / Commitment scheme / ElGamal encryption / Transmission Control Protocol / Cryptography / Public-key cryptography / Cryptographic protocols

Verifiable Homomorphic Oblivious Transfer and Private Equality Test Helger Lipmaa Laboratory for Theoretical CS, Department of CS&E Helsinki University of Technology, P.O.Box 5400, FIN[removed]HUT, Espoo, Finland helger@tc

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
73Finite fields / Electronic commerce / Paillier cryptosystem / Okamoto–Uchiyama cryptosystem / Goldwasser–Micali cryptosystem / XTR / ElGamal encryption / Diffie–Hellman problem / RSA / Cryptography / Public-key cryptography / Computational hardness assumptions

A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and its Applications Emmanuel Bresson1 , Dario Catalano2 , and David Pointcheval2 1

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
74Paillier cryptosystem / RSA / Semantic security / Blum integer / Schmidt–Samoa cryptosystem / Damgård–Jurik cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

Some RSA-based Encryption Schemes with Tight Security Reduction Kaoru Kurosawa1 and Tsuyoshi Takagi2 1 2

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
75Lattice points / Linear algebra / Computational number theory / Homomorphic encryption / Orthogonality / Lenstra–Lenstra–Lovász lattice basis reduction algorithm / Lattice / Private information retrieval / Paillier cryptosystem / Cryptography / Algebra / Mathematics

Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR Tancrède Lepoint1 and Mehdi Tibouchi2 2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-09 03:49:32
76Cyberwarfare / Electronic commerce / Security / Applied mathematics / Paillier cryptosystem / ElGamal encryption / Semantic security / Malleability / RSA / Cryptography / Public-key cryptography / Homomorphic encryption

Computing Blindfolded: New Developments in Fully Homomorphic Encryption Vinod Vaikuntanathan University of Toronto Abstract— A fully homomorphic encryption scheme enables computation of arbitrary functions on encrypte

Add to Reading List

Source URL: www.cs.toronto.edu

Language: English - Date: 2011-09-08 00:17:47
77Chosen-ciphertext attack / Ciphertext / RSA / Adaptive chosen-ciphertext attack / Advantage / Paillier cryptosystem / Affine cipher / Cryptography / Homomorphic encryption / Chosen-plaintext attack

DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity Dhananjay S. Phatak,∗ Qiang Tang,† Alan T. Sherman,∗ Warren D. Smith,‡ Peter Ryan,† Kostas Kalpakis∗ April[removed]re

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-26 15:05:13
78Secure multi-party computation / Verifiable computing / Paillier cryptosystem / Cryptography / Cryptographic protocols / Homomorphic encryption

Cryptography Research Group X0 X1

Add to Reading List

Source URL: www.seas.virginia.edu

Language: English - Date: 2013-08-27 15:09:41
79Homomorphic encryption / Applied mathematics / Deterministic encryption / Paillier cryptosystem / Public-key cryptography / Cipher / Encryption / Authenticated encryption / Proxy re-encryption / Cryptography / Cyberwarfare / Security

Language support for efficient computation over encrypted data Meelap Shah, Emily Stark, Raluca Ada Popa, and Nickolai Zeldovich MIT CSAIL 1

Add to Reading List

Source URL: web.mit.edu

Language: English - Date: 2014-09-26 19:21:18
80Adaptive chosen-ciphertext attack / Malleability / Chosen-ciphertext attack / RSA / Advantage / Chosen-plaintext attack / ID-based encryption / Paillier cryptosystem / Cramer–Shoup cryptosystem / Cryptography / Ciphertext indistinguishability / Semantic security

Bounded CCA2-Secure Encryption Ronald Cramer1,2 , Goichiro Hanaoka3 , Dennis Hofheinz1 , Hideki Imai3,4 , Eike Kiltz1 , Rafael Pass5 , abhi shelat6 , and Vinod Vaikuntanathan7 1 3

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:24:49
UPDATE