Sciweavers

550 search results - page 39 / 110
» Public Key Encryption and Encryption Emulation Attacks
Sort
View
FGCS
2000
104views more  FGCS 2000»
13 years 9 months ago
Protecting secret keys with personal entropy
Conventional encryption technology often requires users to protect a secret key by selecting a password or passphrase. While a good passphrase will only be known to the user, it a...
Carl M. Ellison, Chris Hall, Randy Milbert, Bruce ...
JOC
2008
97views more  JOC 2008»
13 years 9 months ago
Tag-KEM/DEM: A New Framework for Hybrid Encryption
This paper presents a novel framework for the generic construction of hybrid encryption schemes which produces more efficient schemes than the ones known before. A previous framew...
Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa
CRYPTO
2003
Springer
95views Cryptology» more  CRYPTO 2003»
14 years 2 months ago
Plaintext Awareness via Key Registration
Abstract. In this paper, we reconsider the notion of plaintext awareness. We present a new model for plaintext-aware encryption that is both natural and useful. We achieve plaintex...
Jonathan Herzog, Moses Liskov, Silvio Micali
CRYPTO
2011
Springer
245views Cryptology» more  CRYPTO 2011»
12 years 9 months ago
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages
We present a somewhat homomorphic encryption scheme that is both very simple to describe and analyze, and whose security (quantumly) reduces to the worst-case hardness of problems ...
Zvika Brakerski, Vinod Vaikuntanathan
SCN
2010
Springer
144views Communications» more  SCN 2010»
13 years 7 months ago
Generic Constructions of Parallel Key-Insulated Encryption
Exposure of a secret key is a significant threat in practice. As a notion of security against key exposure, Dodis et al. advocated key-insulated security, and proposed concrete k...
Goichiro Hanaoka, Jian Weng