Sciweavers

24 search results - page 2 / 5
» Parallel Key-Insulated Public Key Encryption Without Random ...
Sort
View
ASIACRYPT
2004
Springer
15 years 3 months ago
Towards Plaintext-Aware Public-Key Encryption Without Random Oracles
Mihir Bellare, Adriana Palacio
ACNS
2009
Springer
147views Cryptology» more  ACNS 2009»
14 years 7 months ago
Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions
In this paper, we propose a notion of threshold tag-based encryption schemes that simplifies the notion of threshold identity-based encryption schemes, and we show a conversion fro...
Seiko Arita, Koji Tsurudome
EUROCRYPT
2012
Springer
13 years 10 hour ago
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers
We describe a compression technique that reduces the public key size of van Dijk, Gentry, Halevi and Vaikuntanathan’s (DGHV) fully homomorphic scheme over the integers from ËœO(Î...
Jean-Sébastien Coron, David Naccache, Mehdi...
ACNS
2010
Springer
187views Cryptology» more  ACNS 2010»
15 years 28 days ago
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs
Verifiably encrypted signature schemes (VES) allow a signer to encrypt his or her signature under the public key of a trusted third party, while maintaining public signature verifi...
Markus Rückert, Michael Schneider 0002, Domin...
JUCS
2008
143views more  JUCS 2008»
14 years 9 months ago
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model
Abstract: Recently, Au et al. [Au et al. 2007] pointed out a seemingly neglected security concern for certificateless public key encryption (CL-PKE) scheme, where a malicious key g...
Yong Ho Hwang, Joseph K. Liu, Sherman S. M. Chow