Sciweavers

90
Voted
PKC
2015
Springer
14views Cryptology» more  PKC 2015»
9 years 11 months ago
How Secure is Deterministic Encryption?
Mihir Bellare, Rafael Dowsley, Sriram Keelveedhi
86
Voted
PKC
2015
Springer
9views Cryptology» more  PKC 2015»
9 years 11 months ago
Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks
Michel Abdalla, Fabrice Benhamouda, David Pointche...
85
Voted
PKC
2015
Springer
30views Cryptology» more  PKC 2015»
9 years 11 months ago
Additively Homomorphic UC Commitments with Optimal Amortized Overhead
We propose the first UC secure commitment scheme with (amortized) computational complexity linear in the size of the string committed to. After a preprocessing phase based on obli...
Ignacio Cascudo, Ivan Damgård, Bernardo Mach...
PKC
2015
Springer
16views Cryptology» more  PKC 2015»
9 years 11 months ago
Simple Functional Encryption Schemes for Inner Products
Functional encryption is a new paradigm that allows users to finely control the amount of information that is revealed by a ciphertext to a given receiver. Recent papers have foc...
Michel Abdalla, Florian Bourse, Angelo De Caro, Da...
84
Voted
PKC
2015
Springer
18views Cryptology» more  PKC 2015»
9 years 11 months ago
On the Practical Security of Inner Product Functional Encryption
Functional Encryption (FE) is an exciting new paradigm that extends the notion of public key encryption. In this work we explore the security of Inner Product Functional Encryptio...
Shashank Agrawal, Shweta Agrawal, Saikrishna Badri...
Cryptology
Top of PageReset Settings