Sciweavers

Share
78 search results - page 1 / 16
» On the Selective Opening Security of Practical Public-Key En...
Sort
View
PKC
2015
Springer
10views Cryptology» more  PKC 2015»
4 years 6 months ago
On the Selective Opening Security of Practical Public-Key Encryption Schemes
We show that two well-known and widely employed public-key encryption schemes – RSA Optimal Asymmetric Encryption Padding (RSA-OAEP) and Diffie-Hellman Integrated Encryption Sch...
Felix Heuer, Tibor Jager, Eike Kiltz, Sven Sch&aum...
INFORMATICALT
2006
177views more  INFORMATICALT 2006»
9 years 10 months ago
Cryptanalysis and Improvement of Practical Convertible Authenticated Encryption Schemes Using Self-Certified Public Keys
A convertible authenticated encryption scheme allows a specified recipient to recover and verify a message simultaneously. Moreover the recipient can prove the dishonesty of the se...
Zuhua Shao
CRYPTO
2011
Springer
237views Cryptology» more  CRYPTO 2011»
8 years 10 months ago
Bi-Deniable Public-Key Encryption
In CRYPTO 1997, Canetti et al.put forward the intruiging notion of deniable encryption, which (informally) allows a sender and/or receiver, having already performed some encrypted...
Adam O'Neill, Chris Peikert, Brent Waters
EUROCRYPT
2009
Springer
10 years 11 months ago
A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
Recently, at Crypto 2008, Boneh, Halevi, Hamburg, and Ostrovsky (BHHO) solved the longstanding open problem of "circular encryption," by presenting a public key encrypti...
Jan Camenisch, Nishanth Chandran, Victor Shoup
books