Back to Results
First PageMeta Content
RSA / Chosen-plaintext attack / Chosen-ciphertext attack / Advantage / ElGamal encryption / Ciphertext / Semantic security / Malleability / Cryptography / Ciphertext indistinguishability / Authenticated encryption


An extended abstract of this paper appears in Marc Fischlin (Ed.): 15th IACR International Conference on Practice and Theory of Public-Key Cryptography - PKC 2012, Lecture Notes in Computer Science, Springer-Verlag, 2012
Add to Reading List

Document Date: 2012-05-09 19:14:56


Open Document

File Size: 319,85 KB

Share Result on Facebook

City

Halevi / Baltimore / Boneh / Ostrovsky / Hamburg / /

Company

Air Force Research Laboratory / Google / Output (ˆb = b) AE / GT / Microsoft / IBM / /

/

Event

FDA Phase / /

Facility

Air Force Research Laboratory / Johns Hopkins University / University of California / /

IndustryTerm

generation algorithm / secure systems / probabilistic algorithm / disk encryption systems / decryption algorithm / public and private key encryption systems / keygeneration algorithm / deterministic polynomial-time algorithm / storage systems / circular applications / proof systems / commonly-used encryption algorithms / encryption algorithm / /

Organization

Defense Advanced Research Projects Agency / office of Naval Research / National Science Foundation / U.S. Government / Johns Hopkins University / Department of Defense / University of California / San Diego / /

Person

Kalai / David Cash∗ Matthew Green / Matthew Green† Susan Hohenberger / Bob / Alice / /

/

Position

random variable IND-CPA / hb / function Advn-wcirc-cpa / IND-CPA and IND-CIRC-CPA / Advn-circ-cpa / IND-CPA / CPA / Advn-wcirc-cpa / standard model for PRFs / /

Product

G1 / A1 / A2 / D0 / /

ProvinceOrState

Maryland / California / /

PublishedMedium

Lecture Notes in Computer Science / /

Technology

encryption algorithms / keygeneration algorithm / encryption algorithm / 4.2 Encryption / CCA-secure encryption / symmetric-key encryption / 4.3 Encryption / private key / secret key / deterministic polynomial-time algorithm / probabilistic algorithm / encryption / Security Definitions Public-key encryption / Cryptography / key generation algorithm / public key / For public-key encryption / public-key encryption / 3.1 Encryption / 1 Introduction Encryption / encryption system / simulation / bit encryption / decryption algorithm / following probabilistic algorithm / be encrypted using any public key / /

SocialTag