Semantic security

Results: 252



#Item
101Advantage / Semantic security / XTR / Cyberwarfare / Security / Applied mathematics / Cryptography / ID-based encryption / Ciphertext indistinguishability

1 Public-Key Encryption with Fuzzy Keyword Search: A Provably Secure Scheme under Keyword Guessing Attack Peng Xu and Hai Jin, Senior Member, IEEE

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-08-22 03:22:56
102Semantic security / Deterministic encryption / RSA / ElGamal encryption / Advantage / Cipher / Ciphertext indistinguishability / Plaintext-aware encryption / Cryptography / Public-key cryptography / Electronic commerce

Message-Locked Encryption for Lock-Dependent Messages Mart´ın Abadi1,3 , Dan Boneh2,? , Ilya Mironov1 , Ananth Raghunathan2,?,?? , and Gil Segev2,?,?? 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-07 11:56:24
103Probably approximately correct learning / Mathematical sciences / Data privacy / Mathematics / Cipher / Semantic security / Differential privacy / Cryptography / Computational learning theory / Applied mathematics

Order-Revealing Encryption and the Hardness of Private Learning Mark Bun∗ Mark Zhandry†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-02 22:28:11
104Lattice problem / Learning with errors / Lattice / Public-key cryptography / Cipher / Symmetric-key algorithm / Semantic security / GGH encryption scheme / Ideal lattice cryptography / Cryptography / Lattice-based cryptography / Homomorphic encryption

Attribute-Based Functional Encryption on Lattices (Extended Abstract) Xavier Boyen December 31, 2012

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-31 10:07:10
105Chosen-ciphertext attack / Malleability / Advantage / Cramer–Shoup cryptosystem / Steganography / Ciphertext / Adaptive chosen-ciphertext attack / Cryptosystem / Cipher / Cryptography / Ciphertext indistinguishability / Semantic security

Public-Key Steganography with Active Attacks Michael Backes Christian Cachin IBM Research

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-08-26 15:47:29
106Source code / Ciphertext indistinguishability / Semantic security / Random oracle / Public-key cryptography / Advantage / Hardware obfuscation / Cryptography / Obfuscation / Obfuscated code

Obfuscation for Cryptographic Purposes Dennis Hofheinz1 , John Malone-Lee2 , and Martijn Stam3 1 2 CWI, Amsterdam,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-03-08 09:17:59
107Semantic security / Cipher / RSA / Adaptive chosen-ciphertext attack / Boneh/Franklin scheme / Chosen-ciphertext attack / Key / Advantage / Cryptography / ID-based encryption / Public-key cryptography

Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application Yumiko Hanaoka∗, Goichiro Hanaoka†, Junji Shikata‡and Hideki Imai§ December 12, 2005 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-12-12 03:12:37
108Chosen-plaintext attack / Ciphertext / Cipher / Advantage / RSA / Symmetric-key algorithm / Public-key cryptography / Hybrid cryptosystem / Semantic security / Cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack

Chapter 11 Asymmetric Encryption The setting of public-key cryptography is also called the “asymmetric” setting due to the asymmetry in key information held by the parties. Namely one party has a secret key while ano

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2009-09-20 23:33:23
109Homomorphic encryption / Applied mathematics / RSA / Cryptographic Test Correction / Ciphertext / Cipher / Semantic security / Paillier cryptosystem / Goldwasser–Micali cryptosystem / Cryptography / Cyberwarfare / Security

C:/Documents and Settings/Administrator/My Documents/PAPERS/Accepted/EC10/IHE/latest-version/ihe.dvi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-06-08 10:17:47
110Complexity classes / Obfuscation / Circuit complexity / Obfuscated code / Ciphertext indistinguishability / International Obfuscated C Code Contest / NC / Semantic security / Multilinear map / Theoretical computer science / Computer programming / Computational complexity theory

Survey on Cryptographic Obfuscation M´at´e Horv´ath∗ Laboratory of Cryptography and System Security (CrySyS Lab)† April 24, 2015

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-24 07:02:48
UPDATE