Back to Results
First PageMeta Content
Malleability / Ciphertext / Chosen-plaintext attack / RSA / Plaintext-aware encryption / Paillier cryptosystem / Cryptography / Ciphertext indistinguishability / Homomorphic encryption


Controlled Homomorphic Encryption: Definition and Construction Yvo Desmedt1 1 Vincenzo Iovino2
Add to Reading List

Document Date: 2015-03-06 07:23:00


Open Document

File Size: 344,70 KB

Share Result on Facebook

Country

Italy / United Kingdom / /

/

Facility

University of Luxembourga / University College London / University of Warsaw / University of Salerno / /

IndustryTerm

malicious server / non-uniform polynomial time algorithms / natural applications / computing / encryption algorithm / /

Organization

University of Warsaw / University College London / Vincenzo Iovino2 Giuseppe Persiano3 Ivan Visconti3 Department of Computer Science / University of Luxembourga / European Union / University of Salerno / /

Position

author / IND-CPA / NM-CPA / single-message NM-CPA / /

ProgrammingLanguage

R / /

Technology

Encryption / Cryptography / i-th Encryption / concept Delegatable Homomorphic Encryption / public key / randomized functional encryption / Tag-Based Non-Rerandomizable Functional Encryption / encryption algorithm / 2.1 Functional Encryption / 3 Controllable Homomorphic Encryption / secret key / simulation / R. All algorithms / functional encryption / non-uniform polynomial time algorithms / public key encryption / /

SocialTag