Back to Results
First PageMeta Content



Proof of Plaintext Knowledge for Code-Based Public-Key Encryption Revisited Rong Hu∗, Kirill Morozov† and Tsuyoshi Takagi‡ Abstract In a recent paper at Asiacrypt’2012, Jain et al point out that V´eron code-base
Add to Reading List

Document Date: 2013-07-24 06:24:37


Open Document

File Size: 314,37 KB

Share Result on Facebook

City

Coding / Tokyo / Lattice / /

Company

Ball / Cambridge University Press / HP / /

Country

Japan / /

Currency

USD / /

/

Event

FDA Phase / /

Facility

Kyushu University / Institute of Mathematics / V pub / H pub mT Protocol / PPK(H pub / H pub / /

IndustryTerm

generation algorithm / syndrome decoding algorithm / public key infrastructure / secure services / code-based cryptographic protocols / decryption algorithm / cheaper solution / polynomialtime algorithm / /

NaturalFeature

mT Protocol / H(P mT / HP )mT / /

Organization

Institute of Mathematics for Industry / Cambridge University / China Scholarship Council / U.S. Securities and Exchange Commission / Japan Society for the Promotion of Science / PPT V / Graduate School / Kyushu University / /

Person

Jean-Charles Faug`ere / Rong Hu / Pierre-Louis Cayrel / Phillip Rogaway / Bob McEliece / Ludovic Perret / O. Rabin / N. Asokan / V / Mohammed Meziani / Kirill Morozov / J. Camenisch / V / /

Position

IND-CPA / /

Product

Galil / Fk2 / /

ProgrammingLanguage

V / /

PublishedMedium

IEEE Transactions on Information Theory / /

RadioStation

Fm 2 / /

Technology

public key infrastructure / code-based verifiable encryption / McEliece Encryption / Encryption algorithm / Randomized McEliece encryption / code-based public key encryption / Plaintext Knowledge Protocol / then use Protocol / Niederreiter encryption / Niederreiter verifiable encryption / decoding algorithm / secret key / polynomialtime algorithm / McEliece public key encryption / PPT algorithms / Niederreiter public key encryption / using Sigma-protocols / pub mT Protocol / public key encryption / Encryption / interactive two-party protocol / cryptography / Symmetric Public-Key Encryption / two-party protocols / Key generation algorithm / public key / McEliece verifiable encryption / V. Verifiable encryption / Deep Space Network / PPK protocol / code-based cryptographic protocols / postquantum public key encryption / 6 Verifiable Encryption / 3 algorithm / Decryption algorithm / digital signature / syndrome decoding algorithm / proposed protocol / /

URL

http /