Sciweavers

345 search results - page 7 / 69
» Reverse Public Key Encryption
Sort
View
STOC
2010
ACM
226views Algorithms» more  STOC 2010»
15 years 6 months ago
Public-Key Cryptography from Different Assumptions
We construct a new public key encryption based on two assumptions:
Benny Applebaum, Boaz Barak and Avi Wigderson
SAFECOMP
2005
Springer
15 years 2 months ago
Public-Key Cryptography and Availability
When the safety community designs their systems to also maintain security properties, it is likely that public-key encryption will be among the tools that are applied. The security...
Tage Stabell-Kulø, Simone Lupetti
ICIP
2006
IEEE
15 years 3 months ago
Public Key Watermarking for Reversible Image Authentication
In this paper, we propose a new public key watermarking scheme for reversible image authentication where if the image is authentic, the distortion due to embedding can be complete...
Sang-Kwang Lee, Young-Ho Suh, Yo-Sung Ho
82
Voted
CANS
2010
Springer
150views Cryptology» more  CANS 2010»
14 years 7 months ago
Predicate Encryption with Partial Public Keys
Abstract. Predicate encryption is a new powerful cryptographic primitive which allows for fine-grained access control for encrypted data: the owner of the secret key can release pa...
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
CRYPTO
2011
Springer
235views Cryptology» more  CRYPTO 2011»
13 years 9 months ago
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO ’07), provides an alternative to randomized public-key encryption in various scenari...
Zvika Brakerski, Gil Segev