<--- Back to Details
First PageDocument Content
Cryptography / Public-key cryptography / Homeomorphisms / Homomorphic encryption / Proxy re-encryption / Malleability / Message authentication code / Paillier cryptosystem / RSA / Digital signature
Date: 2017-02-03 04:27:06
Cryptography
Public-key cryptography
Homeomorphisms
Homomorphic encryption
Proxy re-encryption
Malleability
Message authentication code
Paillier cryptosystem
RSA
Digital signature

This is the full version of a paper which appears in Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April, Revised Selected Papers, Springer, LNCS. Homomorphic

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 478,12 KB

Share Document on Facebook

Similar Documents

SPATIAL TRAINING META-ANALYSIS  The malleability of spatial skills: A meta-analysis of training studies David H. Uttal, Nathaniel G. Meadow, Elizabeth Tipton, Linda L. Hand, Alison R. Alden, & Christopher Warren

SPATIAL TRAINING META-ANALYSIS The malleability of spatial skills: A meta-analysis of training studies David H. Uttal, Nathaniel G. Meadow, Elizabeth Tipton, Linda L. Hand, Alison R. Alden, & Christopher Warren

DocID: 1suhA - View Document

SPATIAL TRAINING META-ANALYSIS  The malleability of spatial skills: A meta-analysis of training studies David H. Uttal, Nathaniel G. Meadow, Elizabeth Tipton, Linda L. Hand, Alison R. Alden, & Christopher Warren

SPATIAL TRAINING META-ANALYSIS The malleability of spatial skills: A meta-analysis of training studies David H. Uttal, Nathaniel G. Meadow, Elizabeth Tipton, Linda L. Hand, Alison R. Alden, & Christopher Warren

DocID: 1rIOu - View Document

Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway

Encryption-Scheme Security in the Presence of Key-Dependent Messages J. Black ∗ P. Rogaway

DocID: 1rlwp - View Document

Simplified Submission of Inputs to Protocols Douglas Wikstr¨om CSC KTH Stockholm, Sweden   Abstract. Consider an electronic election scheme implemented using a

Simplified Submission of Inputs to Protocols Douglas Wikstr¨om CSC KTH Stockholm, Sweden Abstract. Consider an electronic election scheme implemented using a

DocID: 1q9YH - View Document

A Formal Treatment of Remotely Keyed Encryption? Matt Blaze1 Joan Feigenbaum1 Moni Naor2 AT&T Labs { Research 180 Park Avenue Florham Park, NJUSA

A Formal Treatment of Remotely Keyed Encryption? Matt Blaze1 Joan Feigenbaum1 Moni Naor2 AT&T Labs { Research 180 Park Avenue Florham Park, NJUSA

DocID: 1pT7s - View Document