Probabilistic encryption

Results: 76



#Item
31Generic Constructions of Integrated PKE and PEKS Yu Chen∗ Jiang Zhang†  Dongdai Lin∗

Generic Constructions of Integrated PKE and PEKS Yu Chen∗ Jiang Zhang† Dongdai Lin∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-01 02:46:37
32Public-Key Encryption with Lazy Parties∗ Kenji Yasunaga† April 28, 2015 Abstract In a public-key encryption scheme, if a sender is not concerned about the security of a message

Public-Key Encryption with Lazy Parties∗ Kenji Yasunaga† April 28, 2015 Abstract In a public-key encryption scheme, if a sender is not concerned about the security of a message

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-28 01:59:26
33Fully Automated Analysis of Padding-Based Encryption in the Computational Model ´sar Kunz, Benedikt Schmidt∗ Gilles Barthe, Juan Manuel Crespo, Ce ´goire† Benjamin Gre

Fully Automated Analysis of Padding-Based Encryption in the Computational Model ´sar Kunz, Benedikt Schmidt∗ Gilles Barthe, Juan Manuel Crespo, Ce ´goire† Benjamin Gre

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-07-03 12:04:07
34Practical Dual-Receiver Encryption Soundness, Complete Non-Malleability, and Applications Sherman S.M. Chow1 , Matthew Franklin2 , and Haibin Zhang2 1  Department of Information Engineering, Chinese University of Hong Ko

Practical Dual-Receiver Encryption Soundness, Complete Non-Malleability, and Applications Sherman S.M. Chow1 , Matthew Franklin2 , and Haibin Zhang2 1 Department of Information Engineering, Chinese University of Hong Ko

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-20 00:58:24
35Chapter 4 Symmetric Encryption The symmetric setting considers two parties who share a key and will use this key to imbue communicated data with various security attributes. The main security goals are privacy and authen

Chapter 4 Symmetric Encryption The symmetric setting considers two parties who share a key and will use this key to imbue communicated data with various security attributes. The main security goals are privacy and authen

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 20:43:23
36Predicate Privacy in Encryption Systems Emily Shen MIT   Elaine Shi

Predicate Privacy in Encryption Systems Emily Shen MIT Elaine Shi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-24 17:15:01
37Single-bit Re-encryption with Applications to Distributed Proof Systems Nikita Borisov   Kazuhiro Minami

Single-bit Re-encryption with Applications to Distributed Proof Systems Nikita Borisov Kazuhiro Minami

Add to Reading List

Source URL: systemsresilience.org

Language: English - Date: 2013-01-05 00:32:20
383 Countermeasures Against Information Leakage 3-1 Subgroup Membership Problem and Its Applications to Information Security YAMAMURA Akihiro and SAITO Taiichi The widely used algorithmic problems, the quadratic residue pr

3 Countermeasures Against Information Leakage 3-1 Subgroup Membership Problem and Its Applications to Information Security YAMAMURA Akihiro and SAITO Taiichi The widely used algorithmic problems, the quadratic residue pr

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:57:32
39Randomness in Cryptography  Febuary 25, 2013 Lecture 8: Cryptography in the presence of local/public randomness Lecturer: Yevgeniy Dodis

Randomness in Cryptography Febuary 25, 2013 Lecture 8: Cryptography in the presence of local/public randomness Lecturer: Yevgeniy Dodis

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2013-12-19 22:46:31
40Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems Rafael Dowsley1 , Goichiro Hanaoka2 Hideki Imai2 , Anderson C. A. Nascimento1 1  2

Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems Rafael Dowsley1 , Goichiro Hanaoka2 Hideki Imai2 , Anderson C. A. Nascimento1 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-06-08 17:57:32