Sciweavers

132 search results - page 2 / 27
» On Public Key Encryption from Noisy Codewords
Sort
View
PKC
2012
Springer
212views Cryptology» more  PKC 2012»
13 years 1 months ago
Public-Key Cryptography from New Multivariate Quadratic Assumptions
In this work, we study a new multivariate quadratic (MQ) assumption that can be used to construct public-key encryption schemes. In particular, we research in the following two di...
Yun-Ju Huang, Feng-Hao Liu, Bo-Yin Yang
CISC
2007
Springer
129views Cryptology» more  CISC 2007»
15 years 3 months ago
Efficient Public Key Encryption with Keyword Search Schemes from Pairings
Public key encryption with keyword search (PEKS) enables user Alice to send a secret key TW to a server that will enable the server to locate all encrypted messages containing the...
Chunxiang Gu, Yuefei Zhu, Heng Pan
STOC
2010
ACM
226views Algorithms» more  STOC 2010»
15 years 8 months ago
Public-Key Cryptography from Different Assumptions
We construct a new public key encryption based on two assumptions:
Benny Applebaum, Boaz Barak and Avi Wigderson
ASIACRYPT
2001
Springer
15 years 3 months ago
Key-Privacy in Public-Key Encryption
We consider a novel security requirement of encryption schemes that we call “key-privacy” or “anonymity”. It asks that an eavesdropper in possession of a ciphertext not be ...
Mihir Bellare, Alexandra Boldyreva, Anand Desai, D...
CRYPTO
2005
Springer
127views Cryptology» more  CRYPTO 2005»
15 years 4 months ago
One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption
Secret-key agreement between two parties Alice and Bob, connected by an insecure channel, can be realized in an informationtheoretic sense if the parties share many independent pai...
Thomas Holenstein, Renato Renner