Back to Results
First PageMeta Content
Chosen-ciphertext attack / Cipher / RSA / ID-based encryption / Advantage / Public-key cryptography / Chosen-plaintext attack / Cryptography / Ciphertext indistinguishability / Authenticated encryption


Time-Specific Encryption? Kenneth G. Paterson and Elizabeth A. Quaglia Information Security Group, Royal Holloway, University of London, [removed], [removed]
Add to Reading List

Document Date: 2010-06-25 03:14:09


Open Document

File Size: 416,47 KB

Share Result on Facebook

Company

US Army Research Laboratory / /

Country

United States / /

Currency

pence / /

/

Facility

US Army Research Laboratory / building TSE / University of London / /

IndustryTerm

public server / basic protocol / elegant solution / probabilistic polynomial-time algorithms / decryption algorithm / network authentication protocol / on-line gaming / encryption algorithm / /

Organization

United States Army / US Government / European Commission / UK Government / Attribute Authority / UK Ministry of Defense / University of London / /

Person

Elizabeth A. Quaglia / Kenneth G. Paterson / /

Position

IND-CPA / modified IND-CPA / /

Technology

Encryption / network authentication protocol / Key-Ext algorithm / public key / six algorithms / public-key encryption / ciphertext-policy Attribute-Based Encryption / identity-based encryption / encryption system / private key / probabilistic polynomial-time algorithms / secret key / Time-Specific Encryption / decryption algorithm / secure MAC algorithm / four algorithms / BE encryption algorithm / five algorithms / /

SocialTag