Back to Results
First PageMeta Content
Advantage / Digital signature / Security parameter / Cryptographic primitive / RSA / Side channel attack / Cipher / Cryptographic protocol / Encryption / Cryptography / Public-key cryptography / Ciphertext indistinguishability


How to Keep a Secret: Leakage Deterring Public-key Cryptography? Aggelos Kiayias and Qiang Tang National and Kapodistrian University of Athens and University of Connecticut ,
Add to Reading List

Document Date: 2013-12-17 11:16:56


Open Document

File Size: 313,43 KB

Share Result on Facebook

/

Facility

Kapodistrian University of Athens / /

IndustryTerm

Σ-protocols / knowledge protocol / knowledge extractor algorithm / probabilistic algorithm / regular algorithms / public recovering algorithm / involved recoverability algorithm / identification protocol / prover interactive algorithm / knowledge protocols / recoverability algorithm / e-payments / hardware device / identification systems / box algorithm / /

Organization

University of Connecticut / PKI / University of Athens / /

Person

Qiang Tang / Forking Lemma / /

Position

extractor / IND-CPA / knowledge extractor / standard IND-CPA / General / /

Technology

encryption / leakage-deterring encryption / Cryptography / EnKey protocol / recoverability algorithm / public key / prover interactive algorithm / leakagedeterring public-key encryption / public-key encryption / Leakage-deterring Public Key Encryption / PKI / box algorithm / knowledge extractor algorithm / recovering algorithm / identification protocol / private key / Verify algorithms / involved recoverability algorithm / secret key / knowledge protocol / public recovering algorithm / digital signature / leakage-deterring public-key encryption / Rec algorithm / regular algorithms / knowledge protocols / probabilistic algorithm / /

SocialTag