ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A generic construction of CCA-secure deterministic encryption
Information Processing Letters
◽
10.1016/j.ipl.2019.105865
◽
2020
◽
Vol 154
◽
pp. 105865
Author(s):
Meijuan Huang
◽
Bo Yang
◽
Yi Zhao
◽
Xin Wang
◽
Yanwei Zhou
◽
...
Keyword(s):
Deterministic Encryption
◽
Generic Construction
Download Full-text
Related Documents
Cited By
References
A generic construction to build simple oblivious transfer protocols from homomorphic encryption schemes
The Journal of Supercomputing
◽
10.1007/s11227-021-03826-0
◽
2021
◽
Author(s):
Saeid Esmaeilzade
◽
Nasrollah Pakniat
◽
Ziba Eslami
Keyword(s):
Homomorphic Encryption
◽
Oblivious Transfer
◽
Encryption Schemes
◽
Generic Construction
Download Full-text
Quantifying Information Leakage of Deterministic Encryption
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop - CCSW'19
◽
10.1145/3338466.3358915
◽
2019
◽
Author(s):
Mireya Jurado
◽
Geoffrey Smith
Keyword(s):
Information Leakage
◽
Deterministic Encryption
Download Full-text
A generic construction of aperiodic complementary sequence sets with low or zero correlation zone
2015 10th International Conference on Information, Communications and Signal Processing (ICICS)
◽
10.1109/icics.2015.7459969
◽
2015
◽
Cited By ~ 1
Author(s):
Yubo Li
◽
Chengqian Xu
◽
Xiaoyu Chen
Keyword(s):
Complementary Sequence
◽
Zero Correlation
◽
Generic Construction
◽
Zero Correlation Zone
Download Full-text
A security weakness in Abdalla et al.’s generic construction of a group key exchange protocol
Information Sciences
◽
10.1016/j.ins.2010.09.011
◽
2011
◽
Vol 181
(1)
◽
pp. 234-238
◽
Cited By ~ 14
Author(s):
Junghyun Nam
◽
Juryon Paik
◽
Dongho Won
Keyword(s):
Key Exchange
◽
Key Exchange Protocol
◽
Group Key
◽
Group Key Exchange
◽
Generic Construction
Download Full-text
Identity-based proxy signatures: a generic construction and a concrete scheme from RSA
Security and Communication Networks
◽
10.1002/sec.1284
◽
2015
◽
Vol 8
(18)
◽
pp. 3602-3614
◽
Cited By ~ 1
Author(s):
Maryam Rajabzadeh Asaar
◽
Mahmoud Salmasizadeh
◽
Colin Boyd
Keyword(s):
Generic Construction
◽
Identity Based
Download Full-text
A generic construction of ciphertext-policy attribute-based encryption supporting attribute revocation
China Communications
◽
10.1109/cc.2014.7022531
◽
2014
◽
Vol 11
(13)
◽
pp. 93-100
◽
Cited By ~ 3
Author(s):
Qiuxin Wu
Keyword(s):
Attribute Based Encryption
◽
Generic Construction
◽
Ciphertext Policy
Download Full-text
Generic Construction of Sequential Aggregate MACs from Any MACs
Provable Security - Lecture Notes in Computer Science
◽
10.1007/978-3-030-01446-9_17
◽
2018
◽
pp. 295-312
◽
Cited By ~ 3
Author(s):
Shingo Sato
◽
Shoichi Hirose
◽
Junji Shikata
Keyword(s):
Generic Construction
Download Full-text
The generic construction of continuous leakage-resilient identity-based cryptosystems
Theoretical Computer Science
◽
10.1016/j.tcs.2018.11.019
◽
2019
◽
Vol 772
◽
pp. 1-45
◽
Cited By ~ 6
Author(s):
Yanwei Zhou
◽
Bo Yang
◽
Yi Mu
Keyword(s):
Generic Construction
◽
Leakage Resilient
◽
Identity Based
Download Full-text
The Local Forking Lemma and Its Application to Deterministic Encryption
Lecture Notes in Computer Science - Advances in Cryptology – ASIACRYPT 2019
◽
10.1007/978-3-030-34618-8_21
◽
2019
◽
pp. 607-636
Author(s):
Mihir Bellare
◽
Wei Dai
◽
Lucy Li
Keyword(s):
Deterministic Encryption
◽
Forking Lemma
Download Full-text
A Generic Construction of the Right System for Population Ageing: Draft Convention on the Rights of the Elderly
Journal of East Asia and International Law
◽
10.14330/jeail.2020.13.1.04
◽
2020
◽
Vol 13
(1)
◽
pp. 75-96
Author(s):
Lin Zhang
◽
◽
Jingjing An
Keyword(s):
The Elderly
◽
Population Ageing
◽
Draft Convention
◽
Generic Construction
◽
The Right
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close