One-time encryption-key technique for the traditional DL-based encryption scheme with anonymity
From MaRDI portal
Publication:621579
DOI10.1016/J.INS.2010.07.032zbMath1206.94098OpenAlexW2066261636WikidataQ120968540 ScholiaQ120968540MaRDI QIDQ621579
Publication date: 28 January 2011
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2010.07.032
indistinguishabilityanonymitypublic-key encryptionchosen ciphertext attackdiscrete-logarithm-based encryption
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- \(k\)-anonymous data collection
- Certificateless threshold ring signature
- An Efficient Deniable Key Exchange Protocol (Extended Abstract)
- Anonymity on Paillier’s Trap-Door Permutation
- Secure integration of asymmetric and symmetric encryption schemes
- Higher Order Universal One-Way Hash Functions
- Public Key Cryptography - PKC 2005
- Financial Cryptography and Data Security
- PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity
- Public Key Cryptography – PKC 2004
This page was built for publication: One-time encryption-key technique for the traditional DL-based encryption scheme with anonymity