<--- Back to Details
First PageDocument Content
Cryptography / Ciphertext indistinguishability / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Ciphertext / Secure multi-party computation / Cryptosystem / Data anonymization / ElGamal encryption
Date: 2007-02-22 22:55:51
Cryptography
Ciphertext indistinguishability
Chosen-ciphertext attack
Adaptive chosen-ciphertext attack
Ciphertext
Secure multi-party computation
Cryptosystem
Data anonymization
ElGamal encryption

Efficient Anonymity-Preserving Data Collection Justin Brickell and Vitaly Shmatikov Department of Computer Sciences The University of Texas at Austin Austin, TX, USA

Add to Reading List

Source URL: www.cyber-ta.org

Download Document from Source Website

File Size: 212,29 KB

Share Document on Facebook

Similar Documents

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

DocID: 1xVFh - View Document

Chosen-Ciphertext Security via Correlated Products Alon Rosen∗ Gil Segev†  Abstract

Chosen-Ciphertext Security via Correlated Products Alon Rosen∗ Gil Segev† Abstract

DocID: 1uJpL - View Document

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

DocID: 1tQVA - View Document

Chosen-Ciphertext Security via Correlated Products∗ Alon Rosen† Gil Segev‡  Abstract

Chosen-Ciphertext Security via Correlated Products∗ Alon Rosen† Gil Segev‡ Abstract

DocID: 1tqoX - View Document