搜索结果: 1-4 共查到“军队指挥学 deterministic public-key encryption”相关记录4条 . 查询时间(0.062 秒)
Deterministic Public-Key Encryption under Continual Leakage
Deterministic Encryption Continual Leakage Searchable Encryption
2016/1/6
Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO
2007), is an important technique for searchable encryption; it allows quick, logarithmic-time,
search over ...
Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions
public-key cryptography / Public-key encryption deterministic encryption randomness extraction.
2013/4/18
Bellare, Boldyreva, and O'Neill (CRYPTO '07) initiated the study of deterministic public-key encryption as an alternative in scenarios where randomized encryption has inherent drawbacks. The resulting...
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
public-key cryptography / deterministic encryption auxiliary inputs composable security
2012/3/28
Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O'Neill (CRYPTO '07), provides an alternative to randomized public-key encryption in various scenarios where the latter exhib...
Deterministic Public-Key Encryption Revisited
Deterministic encryption trapdoor functions hardcore funtions lossy trapdoor functions
2010/10/20
This paper revisits the notion of determinsitic public-key encryption (DE) introduced by Bellare, Boldyreva, and O'Neill~(CRYPTO 2007) and further studied by Bellare et al.~(CRYPTO 2008), Boldyreva et...