![Cryptography / Public-key cryptography / Ciphertext indistinguishability / ID-based encryption / Chosen-plaintext attack / RSA / Ciphertext / Proxy re-encryption / Homomorphic encryption / XTR / Key encapsulation / Semantic security Cryptography / Public-key cryptography / Ciphertext indistinguishability / ID-based encryption / Chosen-plaintext attack / RSA / Ciphertext / Proxy re-encryption / Homomorphic encryption / XTR / Key encapsulation / Semantic security](https://www.pdfsearch.io/img/0ffd5e3b9e1c96d71da59eb4447eed62.jpg) Date: 2018-03-27 10:44:26Cryptography Public-key cryptography Ciphertext indistinguishability ID-based encryption Chosen-plaintext attack RSA Ciphertext Proxy re-encryption Homomorphic encryption XTR Key encapsulation Semantic security | | Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange David Derler1 , Kai Gellert2 , Tibor Jager2 , Daniel Slamanig3 , and Christoph Striecks3 1 Graz University of TechnologyAdd to Reading ListSource URL: eprint.iacr.orgDownload Document from Source Website File Size: 521,22 KBShare Document on Facebook
|