Results 221 to 230 of about 1,838 (257)
Deterministic attribute-based encryption
Attribute-based encryption enables data owners to share their information by specifying access control policies while outsourcing their encrypted data to the cloud. However, there are no efficient searchable schemes over encrypted data in attribute-based setting.
Yanfeng Shi +3 more
openalex +2 more sources
A Novel Deterministic Threshold Proxy Re-Encryption Scheme From Lattices
Aiming at the problem that it is difficult to flexibly realize, the sharing and efficient search of encrypted data in large data-bases, this paper proposes a deterministic threshold proxy re-encryption scheme under the auxiliary input model. This scheme uses Shamir's secret sharing technology to achieve threshold control, uses homomorphic signature ...
Na Hua +3 more
openalex +2 more sources
Deterministic phase encoding encryption in single shot digital holography
We demonstrate a deterministic phase-encoded encryption system based on the digital holography and adopted a lenticular lens array (LLA) sheet as a phase modulator. In the proposed scheme the holographic patterns of encrypted images are captured digitally by a digital CCD.
Chen Guang-Ling +3 more
openalex +2 more sources
On ELFs, Deterministic Encryption, and Correlated-Input Security.
We construct deterministic public key encryption secure for any constant number of arbitrarily correlated computationally unpredictable messages. Prior works required either random oracles or non-standard knowledge assumptions. In contrast, our constructions are based on the exponential hardness of DDH, which is plausible in elliptic curve groups.
Mark Zhandry
openalex +2 more sources
Approximate-Deterministic Public Key Encryption from Hard Learning Problems
We introduce the notion of approximate-deterministic public key encryption (A-DPKE), which extends the notion of deterministic public key encryption (DPKE) by allowing the encryption algorithm to be “slightly” randomized. However, a ciphertext convergence property is required for A-DPKE such that the ciphertexts of a message are gathering in a small ...
Yamin Liu +4 more
openalex +2 more sources
Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions
Functional encryption (FE) enables fine-grained control of sensitive data by allowing users to only compute certain functions for which they have a key. The vast majority of work in FE has focused on deterministic functions, but for several applications such as privacy-aware auditing, differentially-private data release, proxy re-encryption, and more ...
Shashank Agrawal, David J. Wu
openalex +2 more sources
Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model
In this paper, we propose an IND-CCA2 secure Key-Encapsulation (KEM) in the standard model using the Niederreiter Encryption scheme. Also, we propose a PRIV-1CCA secure deterministic variant of the Niederreiter encryption scheme in the standard model. The security of these constructions are reduced to the hardness of the Syndrome Decoding problem and ...
Kuruvilla Mathew +2 more
openalex +2 more sources
The Local Forking Lemma and Its Application to Deterministic Encryption
We bypass impossibility results for the deterministic encryption of public-key-dependent messages, showing that, in this setting, the classical Encrypt-with-Hash scheme provides message-recovery security, across a broad range of message distributions. The proof relies on a new variant of the forking lemma in which the random oracle is reprogrammed on ...
Mihir Bellare, Wei‐Min Dai, Lucy Li
openalex +3 more sources
Identity-Based Deterministic Proxy Re-Encryption Scheme on Lattice
Na Hua, Long Zhang, Kejia Zhang
openalex +2 more sources

