Air Force Research Laboratory / Google / Output (ˆb = b) AE / GT / Microsoft / IBM / / /
Event
FDA Phase / /
Facility
Air Force Research Laboratory / Johns Hopkins University / University of California / /
IndustryTerm
generation algorithm / secure systems / probabilistic algorithm / disk encryption systems / decryption algorithm / public and private key encryption systems / keygeneration algorithm / deterministic polynomial-time algorithm / storage systems / circular applications / proof systems / commonly-used encryption algorithms / encryption algorithm / /
Organization
Defense Advanced Research Projects Agency / office of Naval Research / National Science Foundation / U.S. Government / Johns Hopkins University / Department of Defense / University of California / San Diego / /
Person
Kalai / David Cash∗ Matthew Green / Matthew Green† Susan Hohenberger / Bob / Alice / / /
Position
random variable IND-CPA / hb / function Advn-wcirc-cpa / IND-CPA and IND-CIRC-CPA / Advn-circ-cpa / IND-CPA / CPA / Advn-wcirc-cpa / standard model for PRFs / /
Product
G1 / A1 / A2 / D0 / /
ProvinceOrState
Maryland / California / /
PublishedMedium
Lecture Notes in Computer Science / /
Technology
encryption algorithms / keygeneration algorithm / encryption algorithm / 4.2 Encryption / CCA-secure encryption / symmetric-key encryption / 4.3 Encryption / private key / secret key / deterministic polynomial-time algorithm / probabilistic algorithm / encryption / Security Definitions Public-key encryption / Cryptography / key generation algorithm / public key / For public-key encryption / public-key encryption / 3.1 Encryption / 1 Introduction Encryption / encryption system / simulation / bit encryption / decryption algorithm / following probabilistic algorithm / be encrypted using any public key / /