Probabilistic encryption

Results: 76



#Item
31Chosen-ciphertext attack / Paillier cryptosystem / Advantage / Chosen-plaintext attack / ElGamal encryption / ID-based encryption / Probabilistic encryption / Cipher / RSA / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Generic Constructions of Integrated PKE and PEKS Yu Chen∗ Jiang Zhang† Dongdai Lin∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-01 02:46:37
32Public-key cryptography / Encryption / Digital signature / One-time pad / Key / Probabilistic encryption / Semantic security / Cryptography / Cipher / Signcryption

Public-Key Encryption with Lazy Parties∗ Kenji Yasunaga† April 28, 2015 Abstract In a public-key encryption scheme, if a sender is not concerned about the security of a message

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-28 01:59:26
33RSA / Advantage / XTR / Random oracle / Probabilistic encryption / Cryptography / Optimal asymmetric encryption padding / Ciphertext indistinguishability

Fully Automated Analysis of Padding-Based Encryption in the Computational Model ´sar Kunz, Benedikt Schmidt∗ Gilles Barthe, Juan Manuel Crespo, Ce ´goire† Benjamin Gre

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-07-03 12:04:07
34Ciphertext indistinguishability / Cipher / Malleability / RSA / Chosen-ciphertext attack / Probabilistic encryption / Chosen-plaintext attack / Cryptography / Public-key cryptography / Plaintext-aware encryption

Practical Dual-Receiver Encryption Soundness, Complete Non-Malleability, and Applications Sherman S.M. Chow1 , Matthew Franklin2 , and Haibin Zhang2 1 Department of Information Engineering, Chinese University of Hong Ko

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-20 00:58:24
35Block cipher modes of operation / RSA / Ciphertext / Cipher / Chosen-plaintext attack / Advantage / Feistel cipher / Probabilistic encryption / Authenticated encryption / Cryptography / Ciphertext indistinguishability / Initialization vector

Chapter 4 Symmetric Encryption The symmetric setting considers two parties who share a key and will use this key to imbue communicated data with various security attributes. The main security goals are privacy and authen

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 20:43:23
36Cipher / RSA / Probabilistic encryption / Integrated Encryption Scheme / Cryptography / Ciphertext indistinguishability / Advantage

Predicate Privacy in Encryption Systems Emily Shen MIT Elaine Shi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-24 17:15:01
37Mental poker / Goldwasser–Micali cryptosystem / Probabilistic encryption / XTR / RSA / Block cipher modes of operation / Cipher / Paillier cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / Electronic commerce

Single-bit Re-encryption with Applications to Distributed Proof Systems Nikita Borisov Kazuhiro Minami

Add to Reading List

Source URL: systemsresilience.org

Language: English - Date: 2013-01-05 00:32:20
38Group theory / Decisional Diffie–Hellman assumption / Pseudorandom generator theorem / Order / Commitment scheme / Probabilistic encryption / XTR / Sylow theorems / Abstract algebra / Cryptography / Mathematics

3 Countermeasures Against Information Leakage 3-1 Subgroup Membership Problem and Its Applications to Information Security YAMAMURA Akihiro and SAITO Taiichi The widely used algorithmic problems, the quadratic residue pr

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:57:32
39Key / RSA / Advantage / Chosen-plaintext attack / Random oracle / Randomness / Probabilistic encryption / Ciphertext indistinguishability / Cryptography / Randomness extractor / Strong secrecy

Randomness in Cryptography Febuary 25, 2013 Lecture 8: Cryptography in the presence of local/public randomness Lecturer: Yevgeniy Dodis

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2013-12-19 22:46:31
40Ciphertext indistinguishability / Semantic security / Adaptive chosen-ciphertext attack / RSA / Chosen-ciphertext attack / Ciphertext / Probabilistic encryption / Hybrid cryptosystem / Paillier cryptosystem / Cryptography / Public-key cryptography / Electronic commerce

Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems Rafael Dowsley1 , Goichiro Hanaoka2 Hideki Imai2 , Anderson C. A. Nascimento1 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-06-08 17:57:32
UPDATE