Back to Results
First PageMeta Content
Chosen-ciphertext attack / Paillier cryptosystem / Advantage / Chosen-plaintext attack / ElGamal encryption / ID-based encryption / Probabilistic encryption / Cipher / RSA / Cryptography / Public-key cryptography / Ciphertext indistinguishability


Generic Constructions of Integrated PKE and PEKS Yu Chen∗ Jiang Zhang† Dongdai Lin∗
Add to Reading List

Document Date: 2014-12-01 02:46:37


Open Document

File Size: 432,07 KB

Share Result on Facebook

City

Beijing / /

Company

ABC / Information Assurance Laboratory / State Key Laboratory / /

Country

China / /

Event

FDA Phase / /

Facility

Institute of Information Engineering / State Key Laboratory of Information Security / Institute of Software / /

IndustryTerm

natural solution / satisfactory solution / encryption algorithm / keyword search / /

Organization

National Natural Science Foundation of China / Chinese Academy of Sciences / Institute of Software / Institute of Information Engineering / /

Person

Jiang Zhang† Dongdai Lin / Zhenfeng Zhang / Jiang Zhang / /

Position

IND-PEKS-CPA / CPA / ANOHIBE-CPA / wb / Private Information Retrieval / ANO-HIBE-CPA / IND-HIBE-CPA / /

Product

Archos TV+ Portable Video Player (PVP) / ZI07 / /

PublishedMedium

the National / /

Technology

encryption / PEKS encryption / PEKS encryption algorithm / 1 1 Introduction Public-key encryption / randomized algorithm / public key / public-key encryption / encryption algorithm / integrated public-key encryption / CPA-secure encryption / secret key / following five PPT algorithms / /

SocialTag