Sciweavers

48 search results - page 1 / 10
» Chosen-Ciphertext Security without Redundancy
Sort
View
ASIACRYPT
2003
Springer
13 years 10 months ago
Chosen-Ciphertext Security without Redundancy
Duong Hieu Phan, David Pointcheval
CTRSA
2006
Springer
176views Cryptology» more  CTRSA 2006»
13 years 8 months ago
Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles
Abstract. We present a non-interactive chosen ciphertext secure threshold encryption system. The proof of security is set in the standard model and does not use random oracles. Our...
Dan Boneh, Xavier Boyen, Shai Halevi
CANS
2008
Springer
86views Cryptology» more  CANS 2008»
13 years 7 months ago
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
Proxy re-encryption (PRE), introduced by Blaze, Bleumer and Strauss, allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into an encryption of the sa...
Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen
CRYPTO
2000
Springer
141views Cryptology» more  CRYPTO 2000»
13 years 9 months ago
New Paradigms for Constructing Symmetric Encryption Schemes Secure against Chosen-Ciphertext Attack
Abstract. The paradigms currently used to realize symmetric encryption schemes secure against adaptive chosen ciphertext attack (CCA) try to make it infeasible for an attacker to f...
Anand Desai