Randomized Encryption Techniques
A randomized encryption procedure enciphers a message by randomly choosing a ciphertext from a set of ciphertexts corresponding to the message under the current encryption key. At the cost of increasing the required bandwidth, such procedures may achieve greater cryptographic security than their det...
Main Authors: | Rivest, Ronald L., Sherman, Alan T. |
---|---|
Published: |
2023
|
Online Access: | https://hdl.handle.net/1721.1/149044 |
Similar Items
-
Hourglass schemes: how to prove that cloud files are encrypted
by: van Dijk, Marten, et al.
Published: (2014) -
Searching on Encrypted E-Data Using Random Searchable Encryption (RanSCrypt) Scheme
by: Ahsan, Muhammad A. Manazir, et al.
Published: (2018) -
An overview of video encryption techniques
by: Abomhara, Mohamed, et al.
Published: (2010) -
Practical End-to-End Verifiable Voting via Split-Value Representations and Randomized Partial Checking
by: Rivest, Ronald L., et al.
Published: (2015) -
Message based random variable length key encryption algorithm.
by: Mirvaziri, Hamid, et al.
Published: (2009)