搜索结果: 1-6 共查到“军事学 CCA-secure encryption”相关记录6条 . 查询时间(0.062 秒)
Tightly Secure CCA-Secure Encryption without Pairings
public-key encryption CCA security tightness
font style='font-size:12px;'>
2016/2/23
We present the first CCA-secure public-key encryption scheme based on DDH where the
security loss is independent of the number of challenge ciphertexts and the number of decryption queries.
Our cons...
Concise Multi-Challenge CCA-Secure Encryption and Signatures with Almost Tight Security
CCA-secure encryption multi-user multi-challenge
font style='font-size:12px;'>
2016/1/7
To gain strong confidence in the security of a public-key scheme, it is most desirable for the
security proof to feature a tight reduction between the adversary and the algorithm solving the underlyi...
High Performance Lattice-based CCA-secure Encryption
Lattice-Based Cryptography Encryption Scheme Lattice-Based Assumptions
font style='font-size:12px;'>
2016/1/4
Lattice-based encryption schemes still suffer from a low message throughput per ciphertext. This is mainly
due to the fact that the underlying schemes do not tap the full potentials of LWE. Many cons...
Compact CCA-Secure Encryption with Ciphertext Verifiability
Adaptive Chosen Ciphertext Secure (CCA), Provable Security, CCA with Ciphertext Indistinguishability
font style='font-size:12px;'>
2011/7/25
While CCA secure encryption schemes that provide ciphertext indistinguishability offer strongest form of message secrecy, the integrity of the ciphertext is often overlooked.
Structure Preserving CCA Secure Encryption and Its Application to Oblivious Third Parties
CCA Secure Encryption Oblivious Third Parties
font style='font-size:12px;'>
2011/7/25
In this paper we present the first public key encryption scheme that is structure preserving, i.e., our encryption scheme uses only algebraic operations.
Structure Preserving CCA Secure Encryption and Its Application to Oblivious Third Parties
cryptographic protocols / public-key encryption structure preserving oblivious party
font style='font-size:12px;'>
2012/3/27
In this paper we present the first public key encryption scheme that is structure preserving, i.e., our encryption scheme uses only algebraic operations. In particular it does not use hash-functions o...