Sciweavers

345 search results - page 10 / 69
» On the Security of a Variation of Cramer-Shoup's Public Key ...
Sort
View
ICICS
2010
Springer
13 years 4 months ago
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
Threshold public-key encryption (TPKE) allows a set of users to decrypt a ciphertext if a given threshold of authorized users cooperate. Existing TPKE schemes suffer from either lo...
Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferr...
ACNS
2008
Springer
252views Cryptology» more  ACNS 2008»
14 years 1 months ago
Generic Constructions of Stateful Public Key Encryption and Their Applications
We present generic constructions of stateful public key encryption (StPE). We build several new StPE schemes and explain existing ones using our generic constructions. Of the new ...
Joonsang Baek, Jianying Zhou, Feng Bao
CRYPTO
2011
Springer
235views Cryptology» more  CRYPTO 2011»
12 years 6 months ago
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO ’07), provides an alternative to randomized public-key encryption in various scenari...
Zvika Brakerski, Gil Segev
PKC
2007
Springer
189views Cryptology» more  PKC 2007»
14 years 25 days ago
Parallel Key-Insulated Public Key Encryption Without Random Oracles
Abstract. Key-insulated cryptography is a crucial technique for protecting private keys. To strengthen the security of key-insulated protocols, Hanaoka, Hanaoka and Imai recently i...
Benoît Libert, Jean-Jacques Quisquater, Moti...
AMC
2005
138views more  AMC 2005»
13 years 6 months ago
Practical convertible authenticated encryption schemes using self-certified public keys
A convertible authenticated encryption scheme allows a designated receiver to recover and verify a message simultaneously, during which the recipient can prove the dishonesty of t...
Jiqiang Lv, Xinmei Wang, Kwangjo Kim