نتایج جستجو برای: authenticated encryption

تعداد نتایج: 30521  

2006
Jung Hee Cheon Nicholas Hopper Yongdae Kim Ivan Osipkov

In this paper we consider two security notions related to Identity Based Encryption: Key-insulated public key encryption, introduced by Dodis, Katz, Xu and Yung; and Timed-Release Public Key cryptography, introduced independently by May and Rivest, Shamir and Wagner. We first formalize the notion of secure timed-release cryptography, and show that, despite several differences in its formulation...

2014
Simon Cogliani Diana Maimut David Naccache Rodrigo Portella do Canto Reza Reyhanitabar Serge Vaudenay Damian Vizár

Journal: :IACR Cryptology ePrint Archive 2015
Khodakhast Bibak Bruce M. Kapron S. Venkatesh Roberto Tauraso László Tóth

In this paper, using properties of Ramanujan sums and of the finite Fourier transform of arithmetic functions, we give an explicit formula for the number of solutions of the linear congruence a1x1 + · · · + akxk ≡ b (mod n), with (xi, n) = ti (1 ≤ i ≤ k), where a1, t1, . . . , ak, tk, b, n (n ≥ 1) are arbitrary integers. Some special cases of this problem have been studied in many papers, and h...

2008
Malika Izabachène David Pointcheval

Identity-based encryption is a very convenient tool to avoid key management. Recipient-privacy is also a major concern nowadays. To combine both, anonymous identity-based encryption has been proposed. This paper extends this notion to stronger adversaries (the authority itself). We discuss this new notion, together with a new kind of non-malleability with respect to the identity, for several ex...

2013
Hae-Jung Kim Eun-Jun Yoon

In 2013, Thadvai et al. proposed a novel authenticated encryption scheme with convertibility. They claimed that the proposed scheme satisfies all the properties of an ideal authenticated encryption scheme (AES). However, this paper shows that Thadvai et al.’s AES scheme still suffers from a forgery converted signature attack, that is, any one Corresponding author: Ki-Dong Bu ([email protected]) 27...

Journal: :IACR Transactions on Symmetric Cryptology 2020

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید