2008
DOI: 10.1016/j.ins.2008.04.006
|View full text |Cite
|
Sign up to set email alerts
|

Secure public-key encryption scheme without random oracles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 24 publications
0
2
0
Order By: Relevance
“…The data privacy of an encryption scheme requires the privacy of the encrypted data and it has been well documented in many literatures [2,7]. Security formalizations such as indistinguishability (semantic security) and non-malleability, under either Chosen-Plaintext Attack (CPA) or various kinds of Chosen-Ciphertext Attacks (CCA), have been studied and used to support various data-privacy requirements.…”
Section: Privacy Requirements For the Public Key Encryptionmentioning
confidence: 99%
“…The data privacy of an encryption scheme requires the privacy of the encrypted data and it has been well documented in many literatures [2,7]. Security formalizations such as indistinguishability (semantic security) and non-malleability, under either Chosen-Plaintext Attack (CPA) or various kinds of Chosen-Ciphertext Attacks (CCA), have been studied and used to support various data-privacy requirements.…”
Section: Privacy Requirements For the Public Key Encryptionmentioning
confidence: 99%
“…This topic is not new and can be traced back to Shannon's classic paper [18]. In recent years, this has attracted increasing research attention [2][3][4][5][6][7][8][9][10][11]19,23]. Due to some interesting intrinsic features such as ergodicity, sensitivity to initial conditions and system parameters, the use of chaotic systems for data encryption has been studied extensively [3,[6][7][8][9][10][15][16][17][20][21][22]24,26].…”
Section: Introductionmentioning
confidence: 99%