Probabilistic encryption

From MaRDI portal
Revision as of 23:35, 30 January 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:1057832

DOI10.1016/0022-0000(84)90070-9zbMath0563.94013OpenAlexW4210300416WikidataQ30051773 ScholiaQ30051773MaRDI QIDQ1057832

Silvio Micali

Publication date: 1984

Published in: Journal of Computer and System Sciences (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1016/0022-0000(84)90070-9




Related Items (only showing first 100 items - show all)

Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear GroupsBeyond the Csiszár-Körner bound: best-possible wiretap coding via obfuscationOn-line/off-line DCR-based homomorphic encryption and applicationsEfficient Dynamic-Resharing “Verifiable Secret Sharing” against mobile adversaryA new security notion for PKC in the standard model: weaker, simpler, and still realizing secure channelsHomomorphic encryption: a mathematical surveyThreshold linearly homomorphic encryption on \(\mathrm{Z}/2^k\mathrm{Z}\)PAC privacy: automatic privacy measurement and control of data processingOne-way functions and the hardness of (probabilistic) time-bounded Kolmogorov complexity w.r.t. samplable distributionsCryptography and Digital TransformationSecuring approximate homomorphic encryption using differential privacyBeyond software watermarking: traitor-tracing for pseudorandom functionsBeyond the Csiszár-Korner bound: best-possible wiretap coding via obfuscationLifting standard model reductions to common setup assumptionsInstantiability of classical random-oracle-model encryption transformsCategorical composable cryptographyOn Privacy Models for RFIDHow to Build a Hash Function from Any Collision-Resistant FunctionChasing Diagrams in CryptographyTesting problems with sublearning sample complexityLayout Randomization and NondeterminismOn the statistical properties of Diffie-Hellman distributionsChosen-Ciphertext Secure Fully Homomorphic EncryptionSeparating IND-CPA and Circular Security for Unbounded Length Key CyclesOn the Multi-output Filtering Model and Its ApplicationsQuantifying information flow in cryptographic systemsA fair and efficient solution to the socialist millionaires' problemOn the Black-box Use of Somewhat Homomorphic Encryption in NonInteractive Two-Party ProtocolsPseudorandom generators without the XOR lemmaThe truth behind the myth of the folk theoremOn Extension of Evaluation Algorithms in Keyed-Homomorphic EncryptionNo-signaling linear PCPsEquivalence Between Non-malleability Against Replayable CCA and Other RCCA-Security NotionsCocks’ Identity-Based Encryption in the Standard Model, via Obfuscation Techniques (Short Paper)Development on security models for proxy re-encryption schemesThreshold secret sharing with geometric algebrasA duality between one-way functions and average-case symmetry of informationNP-hardness of approximating meta-complexity: a cryptographic approachAnother look at automated theorem-provingCryptography and Game Theory: Designing Protocols for Exchanging InformationRound-optimal secure multi-party computationNo-signaling linear PCPsSimulation-based receiver selective opening CCA secure PKE from standard computational assumptionsOblivious signature-based envelopeTowards Key-Dependent Message Security in the Standard ModelNew Anonymity Notions for Identity-Based EncryptionNew Anonymity Notions for Identity-Based EncryptionConstant-Round Nonmalleable Commitments from Any One-Way FunctionSome Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk)Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature SchemeGeneralized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman ProblemA CCA Secure Hybrid Damgård’s ElGamal EncryptionMulti-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input SettingA Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees ProtocolA Public-Key Encryption Scheme with Pseudo-random CiphertextsCryptographically Sound Security Proofs for Basic and Public-Key KerberosTowards a Theory of Intrusion DetectionLayout randomization and nondeterminismRelations between robustness and RKA security under public-key encryptionSecrecy types for asymmetric communication.The power of adaptiveness and additional queries in random-self- reductionsThe knowledge complexity of quadratic residuosity languagesPrivate authenticationOn the Clark-Jacob version of SPLICE/ASSO-CCA secure PKE from pairing based all-but-many lossy trapdoor functionsHardness vs randomnessProtecting the privacy of voters: new definitions of ballot secrecy for e-votingLinear complexity of the \(x^{2} \bmod p\) orbitsOn secret set schemesTwo-round adaptively secure multiparty computation from standard assumptionsCertifying trapdoor permutations, revisitedTightly secure signatures and public-key encryptionTweakable block ciphers secure beyond the birthday bound in the ideal cipher modelFast generation of prime numbers and secure public-key cryptographic parameters.Toward a game theoretic view of secure computationOn the bit security of cryptographic primitivesFiat-Shamir and correlation intractability from strong KDM-secure encryptionUnprovable security of perfect NIZK and non-interactive non-malleable commitmentsPartial information in public key cryptographyOne-way permutations in NC 0Deciding knowledge in security protocols under equational theoriesMinimum disclosure proofs of knowledgeA semantically secure public key cryptoscheme using bit-pair shadowsDecision procedures for the security of protocols with probabilistic encryption against offline dictionary attacksA thirty year old conjecture about promise problemsMathematical problems in cryptologyPrivacy-preserving algorithms for distributed mining of frequent itemsetsComputational indistinguishability: algorithms vs. circuitsOn server trust in private proxy auctionsPrivacy and verifiability in voting systems: methods, developments and trendsThe 2010 Benjamin Franklin Medal in Computer and Cognitive Science presented to Shafrira Goldwasser, Ph.D.Paillier-based publicly verifiable (non-interactive) secret sharingOn the impossibility of cryptography with tamperable randomnessConstruction of a key-dependent message secure symmetric encryption scheme in the ideal cipher modelDynamical analysis of a class of Euclidean algorithms.Spreading alerts quietly and the subgroup escape problemSmooth projective hashing and two-message oblivious transferGroup homomorphic encryption: characterizations, impossibility results, and applicationsThe hunting of the SNARKPublic-coin parallel zero-knowledge for NP




Cites Work




This page was built for publication: Probabilistic encryption