View Document Preview and Link
Document Date: 2015-01-12 05:14:03 Open Document File Size: 404,19 KB Share Result on Facebook
Country China / / Facility Aarhus University / / IndustryTerm statistical tools / sample preserving search / search-to-decision reduction / search algorithm/adversary / adversary/search algorithm / search problem / search algorithm / search problems / search algorithms / / Organization Danish National Research Foundation / Aarhus University / Danish Strategic Research Council / National Science Foundation / Sino-Danish Center for the Theory of Interactive Computation / / Position author / Alperin-Sheriff / IND-CPA / standard IND-CPA / experiment KDM-CPA / KDM-CPA / / ProgrammingLanguage D / R / C / / RadioStation Fm 2 / Fm 2 B / / Technology Encryption / distinguishing algorithm / 4 KDM Secure Public Key Encryption / cryptography / 1.2 KDM Secure Public Key Encryption / PPT algorithm / Public Key / adversary/search algorithm / search algorithm / search algorithms / secure public key encryption / private key / secret key / three PPT algorithms / following algorithms / 2.2 Key Dependent Message Secure Public Key Encryption / / SocialTag