Skip to search formSkip to main content

You are currently offline. Some features of the site may not work correctly.

Semantic Scholar uses AI to extract papers important to this topic.

2018

2018

This paper highlights a particular construction of a correct KEM without failures and without ciphertext expansion from any… Expand

Is this relevant?

2018

2018

Recent developments in multi party computation (MPC) and fully homomorphic encryption (FHE) promoted the design and analysis of… Expand

Is this relevant?

2015

2015

The paper "An Efficient Image Homomorphic Encryption Scheme with Small Ciphertext Expansion" In Proc. ACM MM'13, pp.803--812… Expand

Is this relevant?

2013

2013

The field of image processing in the encrypted domain has been given increasing attention for the extensive potential… Expand

Is this relevant?

2013

2013

In some wireless environments, minimizing the size of messages is paramount due to the resulting significant energy savings. We… Expand

Is this relevant?

2008

2008

For public key encryption schemes, adaptive chosen ciphertext security is a widely accepted security notion since it captures a… Expand

Is this relevant?

Highly Cited

2007

Highly Cited

2007

We propose a simple and general framework for constructing oblivious transfer (OT) protocols that are efficient, universally… Expand

Is this relevant?

Highly Cited

2005

Highly Cited

2005

We present a Hierarchical Identity Based Encryption (HIBE) system where the ciphertext consists of just three group elements and… Expand

Is this relevant?

Highly Cited

2000

Highly Cited

2000

We find certain neglected issues in the study of private-key encryption schemes. For one, private-key encryption is generally… Expand

Is this relevant?

2000

2000

The paradigms currently used to realize symmetric encryption schemes secure against adaptive chosen ciphertext attack (CCA) try… Expand

Is this relevant?