Sciweavers

331 search results - page 11 / 67
» Provably Secure Timed-Release Public Key Encryption
Sort
View
ASIACRYPT
2008
Springer
15 years 1 months ago
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
Recently Cash, Kiltz, and Shoup [20] showed a variant of the Cramer-Shoup (CS) public key encryption (PKE) scheme [21] whose chosen-ciphertext (CCA) security relies on the computa...
Goichiro Hanaoka, Kaoru Kurosawa
CRYPTO
1998
Springer
117views Cryptology» more  CRYPTO 1998»
15 years 3 months ago
Relations Among Notions of Security for Public-Key Encryption Schemes
ded abstract of this paper appears in Advances in Cryptology { Crypto 98 Proceedings, Lecture Notes in Computer Science Vol. 1462, H. Krawczyk ed., Springer-Verlag, 1998. This is t...
Mihir Bellare, Anand Desai, David Pointcheval, Phi...
TCC
2009
Springer
153views Cryptology» more  TCC 2009»
16 years 6 days ago
On the (Im)Possibility of Key Dependent Encryption
We study the possibility of constructing encryption schemes secure under messages that are chosen depending on the key k of the encryption scheme itself. We give the following sep...
Iftach Haitner, Thomas Holenstein
SAFECOMP
2005
Springer
15 years 5 months ago
Public-Key Cryptography and Availability
When the safety community designs their systems to also maintain security properties, it is likely that public-key encryption will be among the tools that are applied. The security...
Tage Stabell-Kulø, Simone Lupetti
SCN
2004
Springer
15 years 5 months ago
On the Security Notions for Public-Key Encryption Schemes
Duong Hieu Phan, David Pointcheval