搜索结果: 1-15 共查到“public-key encryption”相关记录132条 . 查询时间(0.154 秒)
Simple and Efficient KDM-CCA Secure Public Key Encryption
key dependent message security chosen ciphertext security
font style='font-size:12px;'>
2019/9/16
We propose two efficient public key encryption (PKE) schemes satisfying key dependent message security against chosen ciphertext attacks (KDM-CCA security). The first one is KDM-CCA secure with respec...
Structure-Preserving and Re-randomizable RCCA-secure Public Key Encryption and its Applications
public-key cryptography Rand-RCCA PKE
font style='font-size:12px;'>
2019/8/22
Re-randomizable RCCA-secure public key encryption (Rand-RCCA PKE) schemes reconcile the property of re-randomizability of the ciphertexts with the need of security against chosen-ciphertexts attacks.
Non-malleability for quantum public-key encryption
public-key cryptography non-malleability quantum cryptography
font style='font-size:12px;'>
2019/5/21
Non-malleability is an important security property for public-key encryption (PKE). Its significance is due to the fundamental unachievability of integrity and authenticity guarantees in this setting,...
Achieving secure and efficient lattice-based public-key encryption: the impact of the secret-key distribution
Lattice cryptography Public-key encryption Noisy ElGamal
font style='font-size:12px;'>
2019/4/22
Lattice-based public-key encryption has a large number of design choices that can be combined in diverse ways to obtain different tradeoffs. One of these choices is the distribution from which secret ...
Everybody's a Target: Scalability in Public-Key Encryption
public-key cryptography key encapsulation, mass surveillance elliptic-curve cryptography (ECC)
font style='font-size:12px;'>
2019/4/10
For 1≤m≤n1≤m≤n, we consider a natural mm-out-of-nn multi-instance scenario for a public-key encryption (PKE) scheme. An adversary, given nn independent instances of PKE, wins if he breaks at least mm ...
Password-Authenticated Public-Key Encryption
Password Authenticated Key Exchange Universal Composability Public Key Encryption
font style='font-size:12px;'>
2019/3/1
We introduce password-authenticated public-key encryption (PAPKE), a new cryptographic primitive. PAPKE enables secure end-to-end encryption between two entities without relying on a trusted third par...
A Framework for Achieving KDM-CCA Secure Public-Key Encryption
key dependent message security chosen ciphertext security projective hash function
font style='font-size:12px;'>
2018/11/16
We propose a framework for achieving a public-key encryption (PKE) scheme that satisfies key dependent message security against chosen ciphertext attacks (KDM-CCA security) based on projective hash fu...
Public Key Encryption Resilient to Post-Challenge Leakage and Tampering Attacks
After-the-Fact Post-challenge Entropic PKE
font style='font-size:12px;'>
2018/11/13
In this paper, we introduce a new framework for constructing public-key encryption (PKE) schemes resilient to joint post-challenge/after-the-fact leakage and tampering attacks in the bounded leakage a...
LAC: Practical Ring-LWE Based Public-Key Encryption with Byte-Level Modulus
lattice based cryptography learning with errors error correction
font style='font-size:12px;'>
2018/11/2
Lattice based cryptography is one of the leading candidates of the post quantum cryptography. A major obstacle of deployment, though, is that its payload is relatively larger than the classical soluti...
Round5: Compact and Fast Post-Quantum Public-Key Encryption
Lattice cryptography Post-quantum cryptography Learning with rounding
font style='font-size:12px;'>
2018/8/10
Standardization bodies such as NIST and ETSI are currently seeking quantum resistant alternatives to vulnerable RSA and elliptic curve-based public-key algorithms. In this context, we present Round5, ...
Limits on the Power of Garbling Techniques for Public-Key Encryption
Public-key encryption one-way function black-box constructions non-black-box separations
font style='font-size:12px;'>
2018/6/5
Understanding whether public-key encryption can be based on one-way functions is a fundamental open problem in cryptography. The seminal work of Impagliazzo and Rudich [STOC'89] shows that black-box c...
Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent
Sanitizable signatures Invisibility Public-key encryption
font style='font-size:12px;'>
2018/4/12
Sanitizable signature schemes are signature schemes which support the delegation of modification rights. The signer can allow a sanitizer to perform a set of admissible operations on the original mess...
Improved fully homomorphic public-key encryption with small ciphertext size
fully homomorphic public-key encryption multivariate algebraic equation
font style='font-size:12px;'>
2018/3/5
A cryptosystem which supports both addition and multiplication (thereby preserving the ring structure of the plaintexts) is known as fully homomorphic encryption (FHE) and is very powerful. Using such...
Fully homomorphic public-key encryption with small ciphertext size
fully homomorphic public-key encryption multivariate algebraic equation non-associative ring
font style='font-size:12px;'>
2018/1/29
In previous work I proposed a fully homomorphic encryption without bootstrapping which has the large size of ciphertext. This tme I propose the fully homomorphic public-key encryption scheme on non-as...
New Techniques for Public Key Encryption with Sender Recovery
KEM DEM
font style='font-size:12px;'>
2018/1/12
In this paper, we consider a scenario where a sender transmits ciphertexts to multiple receivers using a public-key encryption scheme, and at a later point of time, wants to retrieve the plaintexts, w...