Back to Results
First PageMeta Content
Optimal asymmetric encryption padding / Chosen-ciphertext attack / Chosen-plaintext attack / Signcryption / Cipher / Symmetric-key algorithm / RSA / Probabilistic encryption / Semantic security / Cryptography / Public-key cryptography / Ciphertext indistinguishability


Committing Encryption and Publicly-Verifiable SignCryption Yitchak Gertner Amir Herzberg
Add to Reading List

Document Date: 2003-12-17 04:10:40


Open Document

File Size: 294,87 KB

Share Result on Facebook

City

Ramat-Gan / /

Country

Israel / /

/

Facility

Bar-Ilan University / /

IndustryTerm

generation algorithm / deterministic de-committing decryption algorithm / cryptographic tools / probabilistic algorithm / verification algorithm / polytime algorithms i.e. algorithms / deterministic verification algorithm / public verification algorithm / crypto protocols / non-repudiation protocols / encryption algorithm / /

Organization

Bar-Ilan University / Committing Encryption and Publicly-Verifiable SignCryption Yitchak Gertner Amir Herzberg Department of Computer Science / Department of Computer amir@herzberg.name Science / /

Person

Rabin / N. Let / Amir Herzberg / /

Position

adversary cpa / security CE-IND-CPA / CPA / CE-IND-CPA / E-IND-CPA / Exp ind cpa / /

Technology

Encryption / also committing encryption / deterministic verification algorithm / regular asymmetric encryption / asymmetric committing encryption / symmetric committing encryption / deterministic de-committing decryption algorithm / symmetric encryption / key generation algorithm / public key / existing crypto protocols / chosen symmetric encryption / SECURITY OF COMMITTING ENCRYPTION / DcmtDec algorithm / encryption algorithm / ingredients committing encryption / symmetric and asymmetric committing encryptions / non-repudiation protocols / 3 SYNTAX OF SYMMETRIC COMMITTING ENCRYPTION / 1 Introduction Encryption / polytime algorithms i.e. algorithms / CmtEnc algorithm / verification algorithm / asymmetric encryption / public verification algorithm / committing encryption algorithm / CONSTRUCTION OF ASYMMETRIC COMMITTING ENCRYPTION / Committing Encryption / secret key / SYNTAX OF ASYMMETRIC COMMITTING ENCRYPTION / digital signature / 3 Committing Encryption Asymmetric Encryption / four algorithms / probabilistic algorithm / /

SocialTag