Back to Results
First PageMeta Content
XTR / One-way function / Cramer–Shoup cryptosystem / RSA / Paillier cryptosystem / Advantage / Ideal lattice cryptography / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Finite fields


Public-Key Encryption Schemes with Auxiliary Inputs Yevgeniy Dodis1? , Shafi Goldwasser2?? , Yael Kalai3 , Chris Peikert4? ? ? , and Vinod Vaikuntanathan5 1 New York University
Add to Reading List

Document Date: 2010-02-04 10:08:40


Open Document

File Size: 254,15 KB

Share Result on Facebook

City

Halevi / Ostrovsky / Hamburg / Boneh / /

Company

IBM / /

Facility

Microsoft Research Georgia Institute of Technology / University MIT / Weizmann Institute / /

Holiday

Assumption / /

IndustryTerm

public key encryption algorithms / arbitrary protocols / inner product / cryptographic applications / public-key encryption algorithms / polynomial time algorithm / inner products / cryptographic algorithms / decryption algorithm / alternate encryption algorithm / public-key infrastructure / cryptographic algorithm / encryption algorithm / on designing public key encryption algorithms / /

Organization

National Science Foundation / Israel Science Foundation / Weizmann Institute / Georgia Institute of Technology / New York University MIT / /

Person

Kalai / /

Position

same AI-CPA / wAI-CPA / CPA / AI-CPA and wAI-CPA / scheme wAI-CPA / auxiliary input CPA / AI-CPA / /

ProvinceOrState

Saskatchewan / Georgia / /

Technology

Encryption / cryptography / PPT algorithm / public key / artificial intelligence / polynomial time algorithm / public key encryption algorithms / public-key encryption / encryption algorithm / PKI / time algorithm / alternative encryption algorithm / secret key / public-key encryption algorithms / alternate encryption algorithm / decryption algorithm / public-key infrastructure / cryptographic algorithm / considering an alternative encryption algorithm / /

SocialTag