Provably secure public-key encryption schemes: EPOC and PSEC

被引:0
|
作者
Okamoto, Tatsuaki
Fujisaki, Eiichiro
Uchiyama, Shigenori
机构
来源
NTT R and D | 1999年 / 48卷 / 10期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
(Edited Abstract)
引用
收藏
页码:740 / 749
相关论文
共 50 条
  • [1] A brief history of provably-secure public-key encryption
    Dent, Alexander W.
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2008, 2008, 5023 : 357 - 370
  • [2] Provably secure and efficient escrowable public key encryption schemes
    Liu, Wen-Hao
    Wang, Sheng-Bao
    Cao, Zhen-Fu
    Han, Li-Dong
    Tongxin Xuebao/Journal on Communications, 2014, 35 (07): : 33 - 37
  • [3] Provably secure public-key encryption with conjunctive and subset keyword search
    Farras, Oriol
    Ribes-Gonzalez, Jordi
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (05) : 533 - 548
  • [4] Provably secure public-key encryption with conjunctive and subset keyword search
    Oriol Farràs
    Jordi Ribes-González
    International Journal of Information Security, 2019, 18 : 533 - 548
  • [5] Provably secure public-key encryption for length-preserving Chaumian mixes
    Möller, B
    TOPICS IN CRYPTOLOGY - CT-RSA 2003, PROCEEDINGS, 2003, 2612 : 244 - 262
  • [6] Provably secure threshold public-key encryption with adaptive security and short ciphertexts
    Qin, Bo
    Wu, Qianhong
    Zhang, Lei
    Farras, Oriol
    Domingo-Ferrer, Josep
    INFORMATION SCIENCES, 2012, 210 : 67 - 80
  • [7] Compact and Tightly Selective-Opening Secure Public-key Encryption Schemes
    Pan, Jiaxin
    Zeng, Runzhi
    ADVANCES IN CRYPTOLOGY-ASIACRYPT 2022, PT III, 2022, 13793 : 363 - 393
  • [8] A new aspect for security notions: Secure randomness in public-key encryption schemes
    Koshiba, T
    PUBLIC KEY CRYPTOGRAPHY, PROCEEDINGS, 2001, 1992 : 87 - 103
  • [9] Public-Key Anamorphism in (CCA-Secure) Public-Key Encryption and Beyond
    Persiano, Giuseppe
    Phan, Duong Hieu
    Yung, Moti
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT II, 2024, 14921 : 422 - 455
  • [10] On the Power of Public-Key Encryption in Secure Computation
    Mahmoody, Mohammad
    Maji, Hemanta K.
    Prabhakaran, Manoj
    THEORY OF CRYPTOGRAPHY (TCC 2014), 2014, 8349 : 240 - 264