Results 221 to 230 of about 1,838 (257)

Deterministic attribute-based encryption

open access: closedInternational Journal of High Performance Computing and Networking, 2016
Attribute-based encryption enables data owners to share their information by specifying access control policies while outsourcing their encrypted data to the cloud. However, there are no efficient searchable schemes over encrypted data in attribute-based setting.
Yanfeng Shi   +3 more
openalex   +2 more sources

A Novel Deterministic Threshold Proxy Re-Encryption Scheme From Lattices

open access: closedInternational Journal of Information Security and Privacy, 2022
Aiming at the problem that it is difficult to flexibly realize, the sharing and efficient search of encrypted data in large data-bases, this paper proposes a deterministic threshold proxy re-encryption scheme under the auxiliary input model. This scheme uses Shamir's secret sharing technology to achieve threshold control, uses homomorphic signature ...
Na Hua   +3 more
openalex   +2 more sources

Deterministic phase encoding encryption in single shot digital holography

open access: closedApplied Physics B, 2008
We demonstrate a deterministic phase-encoded encryption system based on the digital holography and adopted a lenticular lens array (LLA) sheet as a phase modulator. In the proposed scheme the holographic patterns of encrypted images are captured digitally by a digital CCD.
Chen Guang-Ling   +3 more
openalex   +2 more sources

On ELFs, Deterministic Encryption, and Correlated-Input Security.

open access: closed, 2019
We construct deterministic public key encryption secure for any constant number of arbitrarily correlated computationally unpredictable messages. Prior works required either random oracles or non-standard knowledge assumptions. In contrast, our constructions are based on the exponential hardness of DDH, which is plausible in elliptic curve groups.
Mark Zhandry
openalex   +2 more sources

Approximate-Deterministic Public Key Encryption from Hard Learning Problems

open access: closed, 2016
We introduce the notion of approximate-deterministic public key encryption (A-DPKE), which extends the notion of deterministic public key encryption (DPKE) by allowing the encryption algorithm to be “slightly” randomized. However, a ciphertext convergence property is required for A-DPKE such that the ciphertexts of a message are gathering in a small ...
Yamin Liu   +4 more
openalex   +2 more sources

Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions

open access: closed, 2017
Functional encryption (FE) enables fine-grained control of sensitive data by allowing users to only compute certain functions for which they have a key. The vast majority of work in FE has focused on deterministic functions, but for several applications such as privacy-aware auditing, differentially-private data release, proxy re-encryption, and more ...
Shashank Agrawal, David J. Wu
openalex   +2 more sources

Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model

open access: closed, 2014
In this paper, we propose an IND-CCA2 secure Key-Encapsulation (KEM) in the standard model using the Niederreiter Encryption scheme. Also, we propose a PRIV-1CCA secure deterministic variant of the Niederreiter encryption scheme in the standard model. The security of these constructions are reduced to the hardness of the Syndrome Decoding problem and ...
Kuruvilla Mathew   +2 more
openalex   +2 more sources

The Local Forking Lemma and Its Application to Deterministic Encryption

open access: closed, 2019
We bypass impossibility results for the deterministic encryption of public-key-dependent messages, showing that, in this setting, the classical Encrypt-with-Hash scheme provides message-recovery security, across a broad range of message distributions. The proof relies on a new variant of the forking lemma in which the random oracle is reprogrammed on ...
Mihir Bellare, Wei‐Min Dai, Lucy Li
openalex   +3 more sources

Identity-Based Deterministic Proxy Re-Encryption Scheme on Lattice

open access: closedThe 6th International Conference on Computer Science and Application Engineering, 2022
Na Hua, Long Zhang, Kejia Zhang
openalex   +2 more sources

Home - About - Disclaimer - Privacy