Semantic security

Results: 252



#Item
111Paillier cryptosystem / Commitment scheme / Advantage / RSA / Semantic security / Optimal asymmetric encryption padding / Cryptography / Public-key cryptography / Ciphertext indistinguishability

On definitions of selective opening security Florian B¨ohl∗, Dennis Hofheinz†, and Daniel Kraschewski Karlsruhe Institute of Technology {Florian.Boehl,Dennis.Hofheinz,Daniel.Kraschewski}@kit.edu October 29, 2013

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-10-29 07:48:46
112Random oracle / Password / ID-based encryption / Key-agreement protocol / Advantage / Public-key cryptography / Semantic security / Password Authenticated Key Exchange by Juggling / Cryptography / Cryptographic protocols / Password-authenticated key agreement

ID-Based Group Password-Authenticated Key Exchange Xun Yi1 , Raylin Tso2 , and Eiji Okamoto2 1 School of Engineering and Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-04 01:09:45
113Advantage / Cryptographic protocol / Cipher / XTR / Cryptography / Ciphertext indistinguishability / Semantic security

Inductive Trace Properties for Computational Security Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell Department of Computer Science, Stanford University Abstract. Protocol authentication properties are generally

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-18 00:33:31
114Dolev-Yao model / Public-key cryptography / Protocol composition logic / XTR / Cryptographic primitive / Semantic security / Secure channel / Key-agreement protocol / Commitment scheme / Cryptography / Cryptographic protocols / Ciphertext indistinguishability

Computationally sound compositional logic for key exchange protocols ∗ Anupam Datta, Ante Derek, John C. Mitchell Dept. Computer Science, Stanford University {danupam, aderek, mitchell}@cs.stanford.edu Abstract

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2007-12-18 00:37:13
115ID-based encryption / Cyberwarfare / Semantic security / Applied mathematics / Security / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Bilinear Pairings in Cryptography: Identity Based Encryption Dan Boneh Stanford University

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2014-05-27 15:07:17
116Advantage / Chosen-ciphertext attack / Public-key cryptography / Cipher / Chosen-plaintext attack / Encryption / Semantic security / Cryptography / Ciphertext indistinguishability / ID-based encryption

Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack Junzuo Lai⋆ , Robert H. Deng⋆⋆ , Shengli Liu⋆ ⋆ ⋆ , Jian Weng† , and Yunlei Zhao‡ Abstract. Security against selective o

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-29 21:25:11
117Applied mathematics / Ciphertext indistinguishability / Cipher / Semantic security / RSA / Mix network / Public-key cryptography / Encryption / ElGamal encryption / Cryptography / Cyberwarfare / Security

Security Analysis of Re-Encryption RPC Mix Nets Ralf K¨usters and Tomasz Truderung University of Trier, Germany {kuesters,truderung}@uni-trier.de Abstract. Re-Encryption randomized partial checking (RPC) mix nets were

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-29 05:22:29
118Food and Agriculture Organization / Science / Semantic Web / Information science / Agriculture / AGRIS / Agricultural Information Management Standards / AGROVOC / Agri people / Knowledge representation / Information / Data

Submitted on: [removed]The role of AGRIS in providing global agricultural information to boost productivity and food security Thembani Malapela Food and Agriculture Organization of the United Nations, Rome. Italy

Add to Reading List

Source URL: library.ifla.org

Language: English - Date: 2014-08-06 10:51:38
119ID-based encryption / Secrecy / Homomorphic encryption / Ciphertext indistinguishability / RSA / Semantic security / Cipher / Proxy re-encryption / Integrated Encryption Scheme / Cryptography / Cyberwarfare / Security

Functional Encryption from (Small) Hardware Tokens Kai-Min Chung1? , Jonathan Katz2?? , and Hong-Sheng Zhou3? ? ? 1 Academia Sinica, [removed] University of Maryland, [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-02-23 14:57:23
120Ciphertext / Cramer–Shoup cryptosystem / Chosen-plaintext attack / Semantic security / Cipher / Chosen-ciphertext attack / RSA / ElGamal encryption / Email encryption / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Privacy in Encrypted Content Distribution Using Private Broadcast Encryption Adam Barth1 , Dan Boneh?1 , and Brent Waters2 1 2

Add to Reading List

Source URL: www.adambarth.com

Language: English - Date: 2007-04-29 16:34:52
UPDATE