-
1
-
-
84957629783
-
Relations among Notions of Security for Public-Key Encryption Schemes
-
Krawczyk, H. (ed.) CRYPTO 1998. Springer, Heidelberg
-
Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations among Notions of Security for Public-Key Encryption Schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 26-46. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1462
, pp. 26-46
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
2
-
-
80051975494
-
Receiver-deniable publickey encryption is impossible
-
ePrint Archive, Report 2011/046
-
Bendlin, R., Nielsen, J.B., Nordholt, P.S., Orlandi, C.: Receiver-deniable publickey encryption is impossible. Cryptology ePrint Archive, Report 2011/046 (2011), http://eprint.iacr.org/
-
(2011)
Cryptology
-
-
Bendlin, R.1
Nielsen, J.B.2
Nordholt, P.S.3
Orlandi, C.4
-
3
-
-
84958626761
-
Deniable Encryption
-
Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
-
Canetti, R., Dwork, C., Naor, M., Ostrovsky, R.: Deniable Encryption. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 90-104. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 90-104
-
-
Canetti, R.1
Dwork, C.2
Naor, M.3
Ostrovsky, R.4
-
4
-
-
84947267092
-
Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption
-
Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
-
Cramer, R., Shoup, V.: Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 45-64. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 45-64
-
-
Cramer, R.1
Shoup, V.2
-
5
-
-
79958017065
-
Deniable Encryption with Negligible Detection Probability: An Interactive Construction
-
Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
-
Dürmuth, M., Freeman, D.M.: Deniable Encryption with Negligible Detection Probability: An Interactive Construction. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 610-626. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6632
, pp. 610-626
-
-
Dürmuth, M.1
Freeman, D.M.2
-
6
-
-
80051963591
-
Deniable encryption with negligible detection probability: An interactive construction
-
ePrint Archive, Report 2011/066
-
Dürmuth, M., Freeman, D.M.: Deniable encryption with negligible detection probability: An interactive construction. Cryptology ePrint Archive, Report 2011/066 (2011), http://eprint.iacr.org/
-
(2011)
Cryptology
-
-
Dürmuth, M.1
Freeman, D.M.2
-
7
-
-
77954642903
-
Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
-
Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
-
Fehr, S., Hofheinz, D., Kiltz, E., Wee, H.: Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 381-402. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 381-402
-
-
Fehr, S.1
Hofheinz, D.2
Kiltz, E.3
Wee, H.4
-
8
-
-
78650197977
-
Deniable cloud storage: Sharing files via public-key deniability
-
Al-Shaer, E., Frikken, K.B. (eds.) ACM
-
Gasti, P., Ateniese, G., Blanton, M.: Deniable cloud storage: sharing files via public-key deniability. In: Al-Shaer, E., Frikken, K.B. (eds.) WPES, pp. 31-42. ACM (2010)
-
(2010)
WPES
, pp. 31-42
-
-
Gasti, P.1
Ateniese, G.2
Blanton, M.3
-
9
-
-
0021409284
-
Probabilistic encryption
-
Goldwasser, S., Micali, S.: Probabilistic encryption. JCSS 28(2), 270-299 (1984)
-
(1984)
JCSS
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
10
-
-
69749086390
-
A method for obtaining deniable public-key encryption
-
Ibrahim, M.H.: A method for obtaining deniable public-key encryption. I. J. Network Security 8(1), 1-9 (2009)
-
(2009)
I. J. Network Security
, vol.8
, Issue.1
, pp. 1-9
-
-
Ibrahim, M.H.1
-
11
-
-
69749087308
-
Receiver-deniable public-key encryption
-
Ibrahim, M.H.: Receiver-deniable public-key encryption. I. J. Network Security 8(2), 159-165 (2009)
-
(2009)
I. J. Network Security
, vol.8
, Issue.2
, pp. 159-165
-
-
Ibrahim, M.H.1
-
12
-
-
38549145955
-
Practical Deniable Encryption
-
Geffert, V., Karhumäki, J., Bertoni, A., Preneel, B., Návrat, P., Bieliková, M. (eds.) SOFSEM 2008. Springer, Heidelberg
-
Klonowski, M., Kubiak, P., Kutyłowski, M.: Practical Deniable Encryption. In: Geffert, V., Karhumäki, J., Bertoni, A., Preneel, B., Návrat, P., Bieliková, M. (eds.) SOFSEM 2008. LNCS, vol. 4910, pp. 599-609. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4910
, pp. 599-609
-
-
Klonowski, M.1
Kubiak, P.2
Kutyłowski, M.3
-
13
-
-
0024983231
-
Public-key cryptosystems provably secure against chosen ciphertext attack
-
ACM
-
Naor, M., Yung, M.: Public-key cryptosystems provably secure against chosen ciphertext attack. In: Proc. of the Twenty-Second Annual ACM Symposium on Theory of Computing, Baltimore, Maryland, pp. 427-437. ACM (1990)
-
(1990)
Proc. of the Twenty-Second Annual ACM Symposium on Theory of Computing, Baltimore, Maryland
, pp. 427-437
-
-
Naor, M.1
Yung, M.2
-
14
-
-
80051976689
-
Bi-Deniable Public-Key Encryption
-
Rogaway, P. (ed.) CRYPTO 2011. Springer, Heidelberg
-
O'Neill, A., Peikert, C., Waters, B.: Bi-Deniable Public-Key Encryption. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 525-542. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6841
, pp. 525-542
-
-
O'Neill, A.1
Peikert, C.2
Waters, B.3
-
15
-
-
84974554584
-
Non-interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack
-
Feigenbaum, J. (ed.) CRYPTO 1991. Springer, Heidelberg
-
Rackoff, C., Simon, D.R.: Non-interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 433-444. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 433-444
-
-
Rackoff, C.1
Simon, D.R.2
|