Sciweavers

TCC
2010
Springer
166views Cryptology» more  TCC 2010»
14 years 8 months ago
Public-Key Encryption Schemes with Auxiliary Inputs
We construct public-key cryptosystems that remain secure even when the adversary is given any computationally uninvertible function of the secret key as auxiliary input (even one t...
Yevgeniy Dodis, Shafi Goldwasser, Yael Tauman Kala...