Emura, 2021 - Google Patents
On the security of keyed-homomorphic PKE: preventing key recovery attacks and ciphertext validity attacksEmura, 2021
View PDF- Document ID
- 2877085240803750450
- Author
- Emura K
- Publication year
- Publication venue
- IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
External Links
Snippet
On the Security of Keyed-Homomorphic PKE: Preventing Key Recovery Attacks and Ciphertext
Validity Attacks Page 1 310 IEICE TRANS. FUNDAMENTALS, VOL.E104–A, NO.1 JANUARY
2021 LETTER On the Security of Keyed-Homomorphic PKE: Preventing Key Recovery Attacks …
- 238000011084 recovery 0 title abstract description 20
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Agrawal et al. | PASTA: password-based threshold authentication | |
MacKenzie et al. | Networked cryptographic devices resilient to capture | |
Ding et al. | Simple identity-based cryptography with mediated RSA | |
Chen et al. | Improved identity-based signcryption | |
Boyd et al. | Efficient one-round key exchange in the standard model | |
Chatterjee et al. | Another look at tightness | |
Chen et al. | Combined public-key schemes: The case of ABE and ABS | |
Isshiki et al. | Proxy re-encryption in a stronger security model extended from CT-RSA2012 | |
US20050169478A1 (en) | Practical non-malleable public-key cryptosystem | |
Banfi et al. | Anamorphic encryption, revisited | |
MacKenzie et al. | Delegation of cryptographic servers for capture-resilient devices | |
Sahai et al. | Fully secure accountable-authority identity-based encryption | |
Lai et al. | Efficient CCA-secure PKE from identity-based techniques | |
Dent | Hybrid cryptography | |
Emura | On the security of keyed-homomorphic PKE: preventing key recovery attacks and ciphertext validity attacks | |
Zhang et al. | An ID-based anonymous signcryption scheme for multiple receivers secure in the standard model | |
Daza et al. | CCA2-secure threshold broadcast encryption with shorter ciphertexts | |
Selvi et al. | Certificateless kem and hybrid signcryption schemes revisited | |
Guo et al. | Towards a secure certificateless proxy re-encryption scheme | |
Huang et al. | Generic certificateless key encapsulation mechanism | |
Yi et al. | ID-Based group password-authenticated key exchange | |
Sharmila Deva Selvi et al. | On the security of identity based ring signcryption schemes | |
Daza et al. | Ad-hoc threshold broadcast encryption with shorter ciphertexts | |
Venema et al. | Using Predicate Extension for Predicate Encryption to Generically Obtain Chosen-Ciphertext Security and Signatures | |
Lu et al. | A certificate-based AKA protocol secure against public key replacement attacks. |