Public-key encryption schemes with auxiliary inputs

    TCC, pp. 361-381, 2010.

    Cited by: 183|Bibtex|Views13|Links
    EI
    Keywords:
    large fieldauxiliary inputpublic-key cryptosystemscomputationally uninvertible functionsecret keyMore(6+)

    Abstract:

    We construct public-key cryptosystems that remain secure even when the adversary is given any computationally uninvertible function of the secret key as auxiliary input (even one that may reveal the secret key information-theoretically). Our schemes are based on the decisional Diffie-Hellman (DDH) and the Learning with Errors (LWE) proble...More

    Code:

    Data:

    Your rating :
    0

     

    Tags
    Comments