Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Ciphertext

Known as: Cipher text, Cyphertext 
In cryptography, ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher. Ciphertext is also… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
  • B. Waters
  • Public Key Cryptography
  • 2011
  • Corpus ID: 2053208
We present a new methodology for realizing Ciphertext-Policy Attribute Encryption (CP-ABE) under concrete and noninteractive… Expand
  • table 1
Is this relevant?
Highly Cited
2010
Highly Cited
2010
We present a fully homomorphic encryption scheme which has both relatively small key and ciphertext size. Our construction… Expand
Is this relevant?
Highly Cited
2008
Highly Cited
2008
In a ciphertext policy attribute based encryption system, a user's private key is associated with a set of attributes (describing… Expand
Is this relevant?
Highly Cited
2007
Highly Cited
2007
In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
Is this relevant?
Highly Cited
2007
Highly Cited
2007
In ciphertext policy attribute-based encryption (CP-ABE), every secret key is associated with a set of attributes, and every… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We propose a simple and efficient construction of a CCA-secure public-key encryption scheme from any CPA-secure identity-based… Expand
  • table 1
Is this relevant?
Highly Cited
2002
Highly Cited
2002
We present several new and fairly practical public-key encryption schemes and prove them secure against adaptive chosen… Expand
Is this relevant?
Highly Cited
1998
Highly Cited
1998
A new public key cryptosystem is proposed and analyzed. The scheme is quite practical, and is provably secure against adaptive… Expand
Is this relevant?
Highly Cited
1991
Highly Cited
1991
The zero-knowledge proof of knowledge, first denned by Fiat, Fiege and Shamir, was used by Galil, Haber and Yung as a means of… Expand
Is this relevant?
Highly Cited
1990
Highly Cited
1990
We show how to construct a public-key cryptosystem (as originally defined by DiNe and Hellman) secure against chosen ciphertezt… Expand
Is this relevant?