Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Ciphertext

Known as: Cipher text, Cyphertext 
In cryptography, ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher. Ciphertext is also… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
We present a new methodology for realizing Ciphertext-Policy Attribute Encryption (CP-ABE) under concrete and noninteractive… Expand
  • table 1
Highly Cited
2009
Highly Cited
2009
We present a fully homomorphic encryption scheme which has both relatively small key and ciphertext size. Our construction… Expand
Highly Cited
2008
Highly Cited
2008
In a ciphertext policy attribute based encryption system, a user's private key is associated with a set of attributes (describing… Expand
Highly Cited
2007
Highly Cited
2007
In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
Highly Cited
2007
Highly Cited
2007
In ciphertext policy attribute-based encryption (CP-ABE), every secret key is associated with a set of attributes, and every… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2004
Highly Cited
2004
We propose a simple and efficient construction of a CCA-secure public-key encryption scheme from any CPA-secure identity-based… Expand
  • table 1
Highly Cited
1998
Highly Cited
1998
A new public key cryptosystem is proposed and analyzed. The scheme is quite practical, and is provably secure against adaptive… Expand
Highly Cited
1991
Highly Cited
1991
The zero-knowledge proof of knowledge, first denned by Fiat, Fiege and Shamir, was used by Galil, Haber and Yung as a means of… Expand
Highly Cited
1990
Highly Cited
1990
We show how to construct a public-key cryptosystem (as originally defined by DiNe and Hellman) secure against chosen ciphertezt… Expand
Highly Cited
1985
Highly Cited
1985
Pseudonoise sequences generated by linear feedback shift registers [1] with some nonlinear combining function have been proposed… Expand
  • figure 2
  • figure 3
  • figure 4
  • figure 5
  • figure 6