Sciweavers

2967 search results - page 442 / 594
» Cryptology
Sort
View
TCC
2005
Springer
132views Cryptology» more  TCC 2005»
15 years 11 months ago
Evaluating 2-DNF Formulas on Ciphertexts
Let ψ be a 2-DNF formula on boolean variables x1, . . . , xn ∈ {0, 1}. We present a homomorphic public key encryption scheme that allows the public evaluation of ψ given an en...
Dan Boneh, Eu-Jin Goh, Kobbi Nissim
TCC
2005
Springer
118views Cryptology» more  TCC 2005»
15 years 11 months ago
On the Relationships Between Notions of Simulation-Based Security
Several compositional forms of simulation-based security have been proposed in the literature, including universal composability, black-box simulatability, and variants thereof. Th...
Anupam Datta, Ralf Küsters, John C. Mitchell,...
TCC
2005
Springer
77views Cryptology» more  TCC 2005»
15 years 11 months ago
Upper and Lower Bounds on Black-Box Steganography
We study the limitations of steganography when the sender is not using any properties of the underlying channel beyond its entropy and the ability to sample from it. On the negati...
Nenad Dedic, Gene Itkis, Leonid Reyzin, Scott Russ...
TCC
2005
Springer
95views Cryptology» more  TCC 2005»
15 years 11 months ago
Keyword Search and Oblivious Pseudorandom Functions
We study the problem of privacy-preserving access to a database. Particularly, we consider the problem of privacy-preserving keyword search (KS), where records in the database are ...
Michael J. Freedman, Yuval Ishai, Benny Pinkas, Om...
WCC
2005
Springer
172views Cryptology» more  WCC 2005»
15 years 11 months ago
Dimension of the Linearization Equations of the Matsumoto-Imai Cryptosystems
Abstract. The Matsumoto-Imai (MI) cryptosystem was the first multivariate public key cryptosystem proposed for practical use. Though MI is now considered insecure due to Patarin...
Adama Diene, Jintai Ding, Jason E. Gower, Timothy ...