Results 241 to 250 of about 1,838 (257)
Some of the next articles are maybe not open access.
Attribute Based Encryption for Deterministic Finite Automata from $$\mathsf{DLIN}$$
2019Waters [Crypto, 2012] provided the first attribute based encryption scheme ABE for Deterministic Finite Automata (DFA) from a parametrized or “q-type” assumption over bilinear maps. Obtaining a construction from static assumptions has been elusive, despite much progress in the area of ABE.
Shweta Agrawal +2 more
openaire +1 more source
Computationally Sound Typing for Non-interference: The Case of Deterministic Encryption
2007Type systems for secure information flow aim to prevent a program from leaking information from variables that hold secret data to variables that hold public data. In this work we present a type system to address deterministic encryption. The intuition that encrypting a secret yields a public value, that can be stored in a public variable, is faithful ...
Judicaël Courant +2 more
openaire +1 more source
Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch
2016Block-cipher-based authenticated encryption has obtained considerable attention from the ongoing CAESAR competition. While the focus of CAESAR resides primarily on nonce-based authenticated encryption, Deterministic Authenticated Encryption DAE is used in domains such as key wrap, where the available message entropy motivates to omit the overhead for ...
Christian Forler +3 more
openaire +1 more source
Deterministic Identity-Based Encryption from Lattices with More Compact Public Parameters
2017Xie et al. (SCN 2012) proposed the first deterministic identity-based encryption (DIBE) scheme with an adaptive security in the auxiliary-input setting, under the learning with errors (LWE) assumption. However, the master public key consists of \(\mathcal {O}(\lambda )\) number of basic matrices.
Daode Zhang +3 more
openaire +1 more source
Permutation-Based Deterministic Authenticated Encryption with Minimum Memory Size
2023Yukihito Hiraga +3 more
openaire +1 more source
Targeted Invertible Pseudorandom Functions and Deterministic Format-Transforming Encryption
2023Sarah Miracle, Scott Yilek
openaire +1 more source
Towards Optimally Secure Deterministic Authenticated Encryption Schemes
Yu Long Chen +3 moreopenaire +1 more source

