Back to Results
First PageMeta Content
Malleability / Cramer–Shoup cryptosystem / Authenticated encryption / Ciphertext / Chosen-plaintext attack / Deterministic encryption / RSA / Advantage / Semantic security / Cryptography / Chosen-ciphertext attack / Ciphertext indistinguishability


Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security Susan Hohenberger∗ Johns Hopkins University Allison Lewko†
Add to Reading List

Document Date: 2012-05-16 11:47:41


Open Document

File Size: 243,65 KB

Share Result on Facebook

Company

Air Force Research Laboratory / Google / Microsoft / /

Event

Product Issues / /

Facility

Austin Brent Waters‡ University of Texas / building CCA / Air Force Research Laboratory / Chosen Ciphertext Security Susan Hohenberger∗ Johns Hopkins University Allison Lewko† University of Texas / /

IndustryTerm

secure systems / Public key encryption systems / probabilistic polynomial-time algorithms / decryption algorithm / reduction algorithm / non-malleable systems / chosen ciphertext secure systems / encryption systems / usual algorithms / attack algorithms / encryption algorithm / chosen plaintext secure encryption systems / /

Organization

Defense Advanced Research Projects Agency / office of Naval Research / University of Texas at Austin / National Science Foundation / U.S. Government / Johns Hopkins University / Department of Defense / /

Person

Brent Waters / /

Position

Πcpa / CPA / Appendix A. CPA / /

Product

random bit generation / /

ProgrammingLanguage

C / /

ProvinceOrState

Texas / Connecticut / /

Technology

arbitrary-length DCCA-secure encryption / 3 3 The decryption algorithm / CPA encryption / tag-based encryption / valid encryption / 1-bit encryptions / encryption algorithm / CCA-secure encryption / adaptively secure Identity-Based Encryption / 1-bit DCCA encryption / CCA encryption / 2.1 Detectable Encryption / The encryption algorithm / one-bit DCCA-secure encryption / probabilistic polynomial-time algorithms / secret key / The decryption algorithm / reduction algorithm / DCCAsecure encryption / fresh encryption / encryption / cryptography / arbitrary-length DCCA encryption / public key / adaptively-secure tag-based encryption / Encryption system / chosen ciphertext secure encryption / simulation / bit encryption / decryption algorithm / attack algorithms / usual algorithms / /

SocialTag