![Chosen-ciphertext attack / Cipher / RSA / ID-based encryption / Advantage / Public-key cryptography / Chosen-plaintext attack / Cryptography / Ciphertext indistinguishability / Authenticated encryption Chosen-ciphertext attack / Cipher / RSA / ID-based encryption / Advantage / Public-key cryptography / Chosen-plaintext attack / Cryptography / Ciphertext indistinguishability / Authenticated encryption](https://www.pdfsearch.io/img/55a63eed86cd8237a9ec44f3f3df5cfc.jpg)
| Document Date: 2010-06-25 03:14:09 Open Document File Size: 416,47 KBShare Result on Facebook
Company US Army Research Laboratory / / Country United States / / Currency pence / / / Facility US Army Research Laboratory / building TSE / University of London / / IndustryTerm public server / basic protocol / elegant solution / probabilistic polynomial-time algorithms / decryption algorithm / network authentication protocol / on-line gaming / encryption algorithm / / Organization United States Army / US Government / European Commission / UK Government / Attribute Authority / UK Ministry of Defense / University of London / / Person Elizabeth A. Quaglia / Kenneth G. Paterson / / Position IND-CPA / modified IND-CPA / / Technology Encryption / network authentication protocol / Key-Ext algorithm / public key / six algorithms / public-key encryption / ciphertext-policy Attribute-Based Encryption / identity-based encryption / encryption system / private key / probabilistic polynomial-time algorithms / secret key / Time-Specific Encryption / decryption algorithm / secure MAC algorithm / four algorithms / BE encryption algorithm / five algorithms / /
SocialTag |