搜索结果: 1-6 共查到“Chosen Ciphertext Attack”相关记录6条 . 查询时间(0.078 秒)
Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack
identity-based encryption chosen ciphertext security selective opening security
2015/12/31
Security against selective opening attack (SOA) requires that in a multi-user setting, even
if an adversary has access to all ciphertexts from users, and adaptively corrupts some fraction of the
use...
Homomorphic Authenticated Encryption Secure Against Chosen-Ciphertext Attack
homomorphic MAC homomorphic encryption
2014/3/6
We study homomorphic authenticated encryption, where privacy and authenticity of data are protected simultaneously. We define homomorphic versions of various security notions for privacy and authentic...
Lattice-Based Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack
Lattice CCA-security Matrix encryption Pseudohomomorphism
2010/3/16
We propose a simple and ecient construction of CCA- secure
public-key encryption scheme based on lattice. Our construction
needs an encryption scheme, which we call \matrix encryption", as building...
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack
Cramer-Shoup KEM Secure Chosen Ciphertext Attack
2009/6/9
We propose a new variant of the Cramer-Shoup KEM (key encapsulation mechanism).
The proposed variant is more e±cient than the original Cramer-Shoup KEM scheme in
terms of public key size and encapsu...
Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
Practical Public-Key Encryption Schemes Secure Adaptive Chosen Ciphertext Attack
2009/4/16
A new public key encryption scheme, along with several variants, is proposed and analyzed.
The scheme and its variants are quite practical, and are proved secure against adaptive chosen
ciphertext a...
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
Public Key Trace Revoke Scheme Secure Adaptive Chosen Ciphertext Attack
2009/4/9
A (public key) Trace and Revoke Scheme combines the functionality of broadcast encryption
with the capability of traitor tracing. Specifically, (1) a trusted center publishes a single public key and ...