Proceedings 2003 IEEE Information Theory Workshop (Cat. No.03EX674)
DOI: 10.1109/itw.2003.1216721
|View full text |Cite
|
Sign up to set email alerts
|

An IND-CPA cryptosystem from Demytko's primitive

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…Theorem 1 The two non-identity based receiptor-oriented encryption schemes in section 4 both have the soundness. In other words, if {ff, f4} is a legal ciphertext returned by the encryptioner on plaintext m C {0, 1}n, then the decryptioner will surely recover the plaintext m E {0, 1}n such that Dup,u,sp,vp,p(Eup,sp,s,sp,p(m, r)) = m (2) where E and D are the encryption and the decryption algorithms respectively; r is a random element chosen by the encryptioner; and other data are the same to what in the two non-identity based ROE schemes in section 4.…”
Section: A Soundnessmentioning
confidence: 99%
See 4 more Smart Citations
“…Theorem 1 The two non-identity based receiptor-oriented encryption schemes in section 4 both have the soundness. In other words, if {ff, f4} is a legal ciphertext returned by the encryptioner on plaintext m C {0, 1}n, then the decryptioner will surely recover the plaintext m E {0, 1}n such that Dup,u,sp,vp,p(Eup,sp,s,sp,p(m, r)) = m (2) where E and D are the encryption and the decryption algorithms respectively; r is a random element chosen by the encryptioner; and other data are the same to what in the two non-identity based ROE schemes in section 4.…”
Section: A Soundnessmentioning
confidence: 99%
“…Recall what is the expansion factor of encryption schemes, it is the ratio between the lengths of the cipher text and the plaintext. The expansion factor of the proposed new schemes is the same as that of [2]. By this definition, we can use some compression technique applying to the cipher text {f,, f4} (of message m) to get its length equal to f4 [81.…”
Section: Efficiency Analysismentioning
confidence: 99%
See 3 more Smart Citations