Sciweavers

345 search results - page 15 / 69
» Reverse Public Key Encryption
Sort
View
AFRICACRYPT
2010
Springer
14 years 8 months ago
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions
David Galindo, Benoît Libert, Marc Fischlin,...
SCN
2010
Springer
113views Communications» more  SCN 2010»
14 years 7 months ago
Public-Key Encryption with Efficient Amortized Updates
Nishanth Chandran, Rafail Ostrovsky, William E. Sk...
TCC
2009
Springer
153views Cryptology» more  TCC 2009»
15 years 10 months ago
On the (Im)Possibility of Key Dependent Encryption
We study the possibility of constructing encryption schemes secure under messages that are chosen depending on the key k of the encryption scheme itself. We give the following sep...
Iftach Haitner, Thomas Holenstein
TCC
2010
Springer
170views Cryptology» more  TCC 2010»
15 years 6 months ago
Public-Key Cryptographic Primitives Provably as Secure as Subset Sum
Abstract. We propose a semantically-secure public-key encryption scheme whose security is polynomialtime equivalent to the hardness of solving random instances of the subset sum pr...
Vadim Lyubashevsky, Adriana Palacio, Gil Segev