Sciweavers

57 search results - page 1 / 12
» Addition of ElGamal Plaintexts
Sort
View
ASIACRYPT
2000
Springer
13 years 9 months ago
Addition of ElGamal Plaintexts
Abstract. We introduce an efficient method for performing computation on encrypted data, allowing addition of ElGamal encrypted plaintexts. We demonstrate a solution that is robust...
Markus Jakobsson, Ari Juels
PKC
1998
Springer
107views Cryptology» more  PKC 1998»
13 years 9 months ago
On the Security of ElGamal Based Encryption
The ElGamal encryption scheme has been proposed several years ago and is one of the few probabilistic encryption schemes. However, its security has never been concretely proven bas...
Yiannis Tsiounis, Moti Yung
ICDCS
2005
IEEE
13 years 10 months ago
Distributed Blinding for Distributed ElGamal Re-Encryption
A protocol is given to take an ElGamal ciphertext encrypted under the key of one distributed service and produce the corresponding ciphertext encrypted under the key of another di...
Lidong Zhou, Michael A. Marsh, Fred B. Schneider, ...
ASIACRYPT
2010
Springer
13 years 2 months ago
Leakage Resilient ElGamal Encryption
Blinding is a popular and well-known countermeasure to protect public-key cryptosystems against side-channel attacks. The high level idea is to randomize an exponentiation in order...
Eike Kiltz, Krzysztof Pietrzak
FUIN
2006
69views more  FUIN 2006»
13 years 4 months ago
An Efficient and Secure Cryptosystem for Encrypting Long Messages
Traditionally, due to efficiency considerations, when encrypting long messages using an asymmtric cryptosystem, one needs to use a symmetric cryptosystem in addition. To eliminate ...
Sheng Zhong