Efficient cryptosystems from \(2^k\)-th power residue symbols (Q2397448): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Tighter Reductions for Forward-Secure Signature Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hedged Public-Key Encryption: How to Protect against Bad Randomness / rank
 
Normal rank
Property / cites work
 
Property / cites work: Deterministic and Efficiently Searchable Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3332246 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Simple Unpredictable Pseudo-Random Number Generator / rank
 
Normal rank
Property / cites work
 
Property / cites work: Receipt-free secret-ballot elections (extended abstract) / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information / rank
 
Normal rank
Property / cites work
 
Property / cites work: Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening / rank
 
Normal rank
Property / cites work
 
Property / cites work: Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting / rank
 
Normal rank
Property / cites work
 
Property / cites work: Small solutions to polynomial equations, and low exponent RSA vulnerabilities / rank
 
Normal rank
Property / cites work
 
Property / cites work: Magic Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: More Constructions of Lossy and Correlation-Secure Trapdoor Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: More constructions of lossy and correlation-secure trapdoor functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Probabilistic encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Foundations of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical chosen ciphertext secure encryption from factoring / rank
 
Normal rank
Property / cites work
 
Property / cites work: Extended-DDH and Lossy Trapdoor Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3999066 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Generation of Prime Numbers on Portable Devices: An Update / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536239 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4036894 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3191615 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Instantiability of RSA-OAEP under Chosen-Plaintext Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: A New Randomness Extraction Paradigm for Hybrid Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4454815 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Generic Homomorphic Undeniable Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public Key Cryptography – PKC 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3614010 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2724585 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249647 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes / rank
 
Normal rank
Property / cites work
 
Property / cites work: An improved algorithm for computing logarithms over<tex>GF(p)</tex>and its cryptographic significance (Corresp.) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lossy trapdoor functions and their applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: A public-key cryptosystem using purely cubic fields / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5316395 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A public-key cryptosystem utilizing cyclotomic fields / rank
 
Normal rank
Property / cites work
 
Property / cites work: Dual Projective Hashing and Its Applications — Lossy Trapdoor Functions and More / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2778922 / rank
 
Normal rank

Latest revision as of 21:20, 13 July 2024

scientific article
Language Label Description Also known as
English
Efficient cryptosystems from \(2^k\)-th power residue symbols
scientific article

    Statements

    Efficient cryptosystems from \(2^k\)-th power residue symbols (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    22 May 2017
    0 references
    public-key encryption
    0 references
    quadratic residuosity
    0 references
    Goldwasser-Micali cryptosystem
    0 references
    homomorphic encryption
    0 references
    standard model
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers