Ciphertext expansion

In cryptography, the term ciphertext expansion refers to the length increase of a message when it is encrypted. Many modern cryptosystems cause some… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2000-2016
0520002016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
The paper "<i>An Efficient Image Homomorphic Encryption Scheme with Small Ciphertext Expansion</i>" <i>In Proc.</i> ACM MM'13, pp… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2015
2015
Homomorphic encryption becomes one of the key components in many emerging applications, e.g., cloud computing, to achieve privacy… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2015
2015
In some wireless environments, minimizing the size of messages is paramount due to the resulting significant energy savings. We… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
Is this relevant?
2013
2013
The field of image processing in the encrypted domain has been given increasing attention for the extensive potential… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2013
2013
In some wireless environments, minimizing the size of messages is paramount due to the resulting significant energy savings. We… (More)
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2010
Highly Cited
2010
We construct a simple public-key encryption scheme that supports polynomially many additions and one multiplication, similar to… (More)
Is this relevant?
Highly Cited
2007
Highly Cited
2007
We propose a simple and general framework for constructing oblivious transfer (OT) protocols that are efficient, universally… (More)
  • figure 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
We present a Hierarchical Identity Based Encryption (HIBE) system where the ciphertext consists of just three group elements and… (More)
Is this relevant?
Highly Cited
2000
Highly Cited
2000
We find certain neglected issues in the study of private-key encryption schemes. For one, private-key encryption is generally… (More)
Is this relevant?
2000
2000
The paradigms currently used to realize symmetric encryption schemes secure against adaptive chosen ciphertext attack (CCA) try… (More)
  • figure 1
  • figure 2
Is this relevant?