Sciweavers

345 search results - page 5 / 69
» On the Security of a Variation of Cramer-Shoup's Public Key ...
Sort
View
CRYPTO
1998
Springer
117views Cryptology» more  CRYPTO 1998»
13 years 11 months ago
Relations Among Notions of Security for Public-Key Encryption Schemes
ded abstract of this paper appears in Advances in Cryptology { Crypto 98 Proceedings, Lecture Notes in Computer Science Vol. 1462, H. Krawczyk ed., Springer-Verlag, 1998. This is t...
Mihir Bellare, Anand Desai, David Pointcheval, Phi...
APPROX
2011
Springer
272views Algorithms» more  APPROX 2011»
12 years 6 months ago
Public Key Locally Decodable Codes with Short Keys
This work considers locally decodable codes in the computationally bounded channel model. The computationally bounded channel model, introduced by Lipton in 1994, views the channe...
Brett Hemenway, Rafail Ostrovsky, Martin J. Straus...
SCN
2004
Springer
14 years 1 days ago
On the Security Notions for Public-Key Encryption Schemes
Duong Hieu Phan, David Pointcheval
EUROCRYPT
2012
Springer
11 years 9 months ago
Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers
We describe a compression technique that reduces the public key size of van Dijk, Gentry, Halevi and Vaikuntanathan’s (DGHV) fully homomorphic scheme over the integers from ËœO(Î...
Jean-Sébastien Coron, David Naccache, Mehdi...
CISC
2007
Springer
129views Cryptology» more  CISC 2007»
13 years 10 months ago
Efficient Public Key Encryption with Keyword Search Schemes from Pairings
Public key encryption with keyword search (PEKS) enables user Alice to send a secret key TW to a server that will enable the server to locate all encrypted messages containing the...
Chunxiang Gu, Yuefei Zhu, Heng Pan