<--- Back to Details
First PageDocument Content
Cryptography / Functional encryption / RSA / Ciphertext indistinguishability
Date: 2017-09-07 14:53:41
Cryptography
Functional encryption
RSA
Ciphertext indistinguishability

Non-Trivial Witness Encryption and Null-iO from Standard Assumptions Zvika Brakerski∗ Aayush Jain†

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 338,31 KB

Share Document on Facebook

Similar Documents

AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1  Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1 Dept. of Electrical and Computer Engineering, Thammasat University, Thailand

DocID: 1rsSn - View Document

Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway

Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway

DocID: 1rlwp - View Document

Format-Preserving Encryption Mihir Bellare1 , Thomas Ristenpart1 , Phillip Rogaway2 , and Till Stegers2 1 Dept. of Computer Science & Engineering, UC San Diego, La Jolla, CA 92093, USA 2

Format-Preserving Encryption Mihir Bellare1 , Thomas Ristenpart1 , Phillip Rogaway2 , and Till Stegers2 1 Dept. of Computer Science & Engineering, UC San Diego, La Jolla, CA 92093, USA 2

DocID: 1qY1X - View Document

MPC vs. SFE: Perfect Security in a Unified Corruption Model ? Zuzana Beerliov´a-Trub´ıniov´a, Matthias Fitzi, Martin Hirt, Ueli Maurer, and Vassilis Zikas Department of Computer Science, ETH Zurich {bzuzana,fitzi,hir

MPC vs. SFE: Perfect Security in a Unified Corruption Model ? Zuzana Beerliov´a-Trub´ıniov´a, Matthias Fitzi, Martin Hirt, Ueli Maurer, and Vassilis Zikas Department of Computer Science, ETH Zurich {bzuzana,fitzi,hir

DocID: 1qXf8 - View Document

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

DocID: 1qWnQ - View Document