Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Ciphertext expansion

In cryptography, the term ciphertext expansion refers to the length increase of a message when it is encrypted. Many modern cryptosystems cause some… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
This paper highlights a particular construction of a correct KEM without failures and without ciphertext expansion from any… Expand
  • figure 1.1
Is this relevant?
2018
2018
Recent developments in multi party computation (MPC) and fully homomorphic encryption (FHE) promoted the design and analysis of… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
2015
2015
The paper "An Efficient Image Homomorphic Encryption Scheme with Small Ciphertext Expansion" In Proc. ACM MM'13, pp.803--812… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2013
2013
The field of image processing in the encrypted domain has been given increasing attention for the extensive potential… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2013
2013
In some wireless environments, minimizing the size of messages is paramount due to the resulting significant energy savings. We… Expand
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
2008
2008
For public key encryption schemes, adaptive chosen ciphertext security is a widely accepted security notion since it captures a… Expand
Is this relevant?
Highly Cited
2007
Highly Cited
2007
We propose a simple and general framework for constructing oblivious transfer (OT) protocols that are efficient, universally… Expand
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2005
Highly Cited
2005
We present a Hierarchical Identity Based Encryption (HIBE) system where the ciphertext consists of just three group elements and… Expand
Is this relevant?
Highly Cited
2000
Highly Cited
2000
We find certain neglected issues in the study of private-key encryption schemes. For one, private-key encryption is generally… Expand
Is this relevant?
2000
2000
The paradigms currently used to realize symmetric encryption schemes secure against adaptive chosen ciphertext attack (CCA) try… Expand
  • figure 1
  • figure 2
Is this relevant?