Public-Key Encryption Schemes with Auxiliary Inputs. Theory of Cryptography
7th Theory of Cryptography Conference, TCC 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings
Main Authors: | Dodis, Yevgeniy, Goldwasser, Shafi |
---|---|
Other Authors: | Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science |
Format: | Article |
Language: | en_US |
Published: |
Springer Berlin / Heidelberg
2012
|
Online Access: | http://hdl.handle.net/1721.1/73868 https://orcid.org/0000-0003-4728-1535 |
Similar Items
-
Exposure-resilient cryptography
by: Dodis, Yevgeniy, 1976-
Published: (2014) -
Circular and leakage resilient public-key encryption under subgroup indistinguishability (or: Quadratic residuosity strikes back)
by: Brakerski, Zvika, et al.
Published: (2012) -
The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator
by: Bitansky, Nir, et al.
Published: (2021) -
Distributed Public Key Schemes Secure against Continual Leakage
by: Akavia, Adi, et al.
Published: (2021) -
Public key cryptography in resource-constrained WSN
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)