![Homomorphic encryption / Secure multi-party computation / Semantic security / Distributed key generation / Threshold cryptosystem / RSA / Ciphertext indistinguishability / Commitment scheme / XTR / Cryptography / Public-key cryptography / Paillier cryptosystem Homomorphic encryption / Secure multi-party computation / Semantic security / Distributed key generation / Threshold cryptosystem / RSA / Ciphertext indistinguishability / Commitment scheme / XTR / Cryptography / Public-key cryptography / Paillier cryptosystem](https://www.pdfsearch.io/img/a54b64f078cd20b0e5c4186ad6bfd5c9.jpg)
| Document Date: 2014-02-21 12:47:44 Open Document File Size: 667,96 KBShare Result on Facebook
Company IBM / / Country Israel / Denmark / / Currency pence / / / Event FDA Phase / Reorganization / Bankruptcy / / Facility MIRACL library / Bar-Ilan University / Alexandra Institute / Aarhus University / / IndustryTerm generation algorithm / public-coin protocol / authentication protocol / secure protocols / provable solution / sub-protocols / Σ-protocol / composite generation protocol / real world applications / polynomial-time algorithm / simulatable protocol / real-model protocol / secure party protocol / important tool / generic secure protocols / distributive decryption protocol / distributed key generation protocol / polynomial-time algorithms / distributed decryption protocol / cryptographic protocols / distributed discrete log-based key generation systems / decryption protocol / trial division protocol / concrete protocol / generic protocols / multiplicative key shares protocol / additive / generation protocol / online phase / computing / / Organization Aarhus University / Bar-Ilan University / Alexandra Institute / Faculty of Engineering / Department of Computer Science / / / Position following IND-CPA / model / adapting the [BF01] technique / trusted dealer / IND-CPA / / Product Franklin / additional / A2 / BF01 / Damg˚ard / DJ01 / DH76 / Gil99 / / Technology Fiat-Shamir authentication protocol / following Σ-protocol / second protocol / Damg˚ard-Jurik decryption protocol / two-party protocol / secure two-party protocol / polynomial-time algorithms / real protocol / Paillier encryption / generic secure protocols / key generation protocol / two protocols / distributed protocol / secret key / RSA generation protocol / random encryption / 2.4 Σ-Protocols / ElGamal encryption / following protocols / encryption / following sub-protocols / following two algorithms / BatchedDec protocol / secure party protocol / composite generation protocol / DKeyGen protocol / cryptography / PPT algorithm / key generation algorithm / decryption protocol / public-key encryption / RSA key generation protocol / real-model protocol / distributed key generation protocol / polynomial-time algorithm / 2.2 Public-Key Encryption / multiplicative key shares protocol / LocalTrialDiv protocol / 3-round public-coin protocol / simulation / specified protocol / distributive decryption protocol / proposed protocol / distributed decryption protocol / Diffie-Hellman protocol / /
SocialTag |