Sciweavers

341 search results - page 10 / 69
» Deniable Functional Encryption
Sort
View
CRYPTO
2010
Springer
188views Cryptology» more  CRYPTO 2010»
14 years 11 months ago
i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits
Homomorphic encryption (HE) schemes enable computing functions on encrypted data, by means of a public Eval procedure that can be applied to ciphertexts. But the evaluated ciphert...
Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
EUROCRYPT
2007
Springer
15 years 2 months ago
A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security
Motivated by the quest for reducing assumptions in security proofs in cryptography, this paper is concerned with designing efficient symmetric encryption and authentication schemes...
Ueli M. Maurer, Johan Sjödin
88
Voted
CMS
2006
14 years 12 months ago
Selective Encryption for Hierarchical MPEG
Selective encryption of visual data and especially MPEG has attracted a considerable number of researchers in recent years. Scalable visual formats are offering additional function...
Heinz Hofbauer, Thomas Stütz, Andreas Uhl
IACR
2011
122views more  IACR 2011»
13 years 10 months ago
On Authenticated Encryption Using Stream Ciphers Supporting an Initialisation Vector
We describe a systematic framework for using a stream cipher supporting an initialisation vector (IV) to perform various tasks of authentication and authenticated encryption. These...
Palash Sarkar
ACNS
2007
Springer
165views Cryptology» more  ACNS 2007»
15 years 4 months ago
Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
We present two transforms to acquire chosen ciphertext security from tag based techniques. The first one requires the separability of underlying primitives. By separability, info...
Rui Zhang 0002