One-time encryption-key technique for the traditional DL-based encryption scheme with anonymity (Q621579): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(3 intermediate revisions by 3 users not shown)
Property / Wikidata QID
 
Property / Wikidata QID: Q120968540 / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.ins.2010.07.032 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2066261636 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4474200 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249318 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783728 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Financial Cryptography and Data Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2778843 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Certificateless threshold ring signature / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2757239 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure integration of asymmetric and symmetric encryption schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4418528 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public Key Cryptography – PKC 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Higher Order Universal One-Way Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public Key Cryptography - PKC 2005 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Anonymity on Paillier’s Trap-Door Permutation / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Efficient Deniable Key Exchange Protocol (Extended Abstract) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2724435 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035737 / rank
 
Normal rank
Property / cites work
 
Property / cites work: \(k\)-anonymous data collection / rank
 
Normal rank

Latest revision as of 17:36, 3 July 2024

scientific article
Language Label Description Also known as
English
One-time encryption-key technique for the traditional DL-based encryption scheme with anonymity
scientific article

    Statements

    One-time encryption-key technique for the traditional DL-based encryption scheme with anonymity (English)
    0 references
    0 references
    28 January 2011
    0 references
    anonymity
    0 references
    indistinguishability
    0 references
    public-key encryption
    0 references
    discrete-logarithm-based encryption
    0 references
    chosen ciphertext attack
    0 references

    Identifiers