![Cipher / Chosen-plaintext attack / Broadcast encryption / Chosen-ciphertext attack / RSA / Cramer–Shoup cryptosystem / Paillier cryptosystem / Cryptography / Public-key cryptography / Ciphertext Cipher / Chosen-plaintext attack / Broadcast encryption / Chosen-ciphertext attack / RSA / Cramer–Shoup cryptosystem / Paillier cryptosystem / Cryptography / Public-key cryptography / Ciphertext](https://www.pdfsearch.io/img/22edbb22b83db28c26afe30d64e73308.jpg)
| Document Date: 2012-05-29 07:38:50 Open Document File Size: 285,57 KBShare Result on Facebook
City Policy Attribute / Hierarchical Identity / Fuzzy Identity / Attributed / / Company G2 / G1 / Google / Intel / Yahoo / / Currency pence / / IndustryTerm recursive algorithm / Fine-grained access control systems / storage server / probabilistic polynomial-time algorithm / software vulnerability exploit / software checks / decryption algorithm / web portal sites / bilinear / Internet traffic logs / given decryption algorithm / encryption algorithm / rudimentary decryption algorithm / / Organization National Science Foundation / United States Army / Department of Homeland Security / Department of Interior / / Person Amit Sahai‡ Brent Waters / / Position author / dealer / / ProgrammingLanguage C / / Technology Encryption / given decryption algorithm / error-tolerant encryption / randomized algorithm / public key / encryption algorithm / Setup algorithm / Identity-Based Encryption / rudimentary decryption algorithm / The algorithm / private key / secret key / probabilistic polynomial-time algorithm / simulation / decryption algorithm / recursive algorithm / four algorithms / attribute-based encryption / / URL dshield.org / /
SocialTag |