Back to Results
First PageMeta Content
Key management / Security / Applied mathematics / Digital signature / Signcryption / RSA / ID-based encryption / Key / Malleability / Cryptography / Public-key cryptography / Cyberwarfare


A preliminary version of this paper appears in the proceedings of Eurocrypt[removed]This is the full version, which appears as IACR ePrint Archive Record[removed]Key-Versatile Signatures and Applications: RKA, KDM and Jo
Add to Reading List

Document Date: 2014-09-03 04:47:43


Open Document

File Size: 469,49 KB

Share Result on Facebook

City

Bristol / La Jolla / /

Company

DS.Kg / /

Country

United States / United Kingdom / /

/

Facility

building Φ-RKA / Building Φ-RKA PRFs / University of California San Diego / University of Bristol / Merchant Venturers Building / /

IndustryTerm

generation algorithm / deterministic evaluation algorithm / above applications / important applications / simpler and more modular solution / modified decryption algorithm / auxiliary parameter generation algorithm / /

Organization

National Science Foundation / Department of Computer Science / University of Bristol / Department of Computer Science & Engineering / University of California San Diego / /

Person

Alice / SIMA DS / /

Position

extractor / CPA / /

ProvinceOrState

California / /

Technology

PT auxiliary parameter generation algorithm / authenticated public-key encryption / Combining KDM encryption / NIZK technology / PT algorithm / PT algorithms / secret key / Authenticated symmetric encryption / deterministic evaluation algorithm / encryption / cryptography / key generation algorithm / public key / Witness encryption / modified decryption algorithm / public-key encryption / following PT algorithms / Dom / joint encryption / simulation / key-generation algorithm / e.g. encryption / /

SocialTag