1) IND-CCA2 secure IND-CCA2安全2) CCA2-anonymous secure CCA2匿名安全3) IND storage system IND存储系统 1. The internal read and write control algorithms,the tolerant-fault strategies,and the workload balance algorithms for the IND storage system,are all described in detail. 分别给出了...
Aravind Vishnu, S.S., Praveen, I. & Sethumadhavan, M. An IND-CCA2 Secure Certificateless Hybrid Signcryption.Wireless Pers Commun
An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystemPublic key cryptosystemAuthentication procedureDecisional composite residuosity assumptionCertificate-based procedurePublic key cryptosystems more recently developed have to be strong against newer and more advanced forms of ...
An efficient IND-CCA2 secure Paillier-based cryptosystem Angsuman Das, Avishek Adhikari (India) Information Processing Letters 112 (2012) 885-888 Citation: 2 Presenter: 方竣民 Date: 2013/12/02 Outline Introduction Preliminaries and definitions The proposed IND-CCA2 conversion Security...
SOW, DembaAfrican Journal of Pure & Applied Mathematics / Journal Africain de Mathématiques Pures et Appliquees (IMHOTEP)
In this section, we convert the LT scheme into an IND-CCA2 secure PKE scheme in which two error vectors come from a random value. This allows the new scheme to avoid the expansion of ciphertext. Our new IND-CCA2 secure PKE scheme consists of the following four algorithms: ...
IND-CCA2 securityCloud storageCode-based public key encryption (PKE) is a popular choice to achieve post-quantum security, partly due to its capability to achieve fast encryption/decryption. However, code-based PKE has larger ciphertext and public key sizes in comparison to conventional PKE ...
A general construction of ind-cca2 secure public key encryption. In Cryptography and Coding, 9th IMA International Conference, volume 2898 of Lecture Notes in Computer Science, pages 152- 166. Springer, 2003.Kiltz, E., Malone-Lee, J.: A General Construction of IND-CCA2 Secure Public Key ...
Recently an IND-CCA2 secure Paillier-based cryptosystem has been proposed (Das and Adhikari, 2012 [1]). In this note we show that Das and Adhikari do not present any original result: their scheme is a rewriting of the well-known Fujisaki–Okamoto IND-CPA to IND-CCA2 transformation applied...