Ciphertext

Known as: Cipher text, Cyphertext 
In cryptography, ciphertext or cyphertext is the result of encryption performed on plaintext using an algorithm, called a cipher. Ciphertext is also… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2009
Highly Cited
2009
We present a fully homomorphic encryption scheme which has both relatively small key and ciphertext size. Our construction… (More)
Is this relevant?
Highly Cited
2008
Highly Cited
2008
In a ciphertext policy attribute based encryption system, a user’s private key is associated with a set of attributes (describing… (More)
Is this relevant?
Highly Cited
2008
Highly Cited
2008
We present a new methodology for realizing Ciphertext-Policy Attribute Encryption (CP-ABE) under concrete and noninteractive… (More)
  • table 1
Is this relevant?
Highly Cited
2007
Highly Cited
2007
In several distributed systems a user should only be able to access data if a user posses a certain set of credentials or… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
Is this relevant?
Highly Cited
2007
Highly Cited
2007
In ciphertext policy attribute-based encryption (CP-ABE), every secret key is associated with a set of attributes, and every… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
In a proxy re-encryption (PRE) scheme, a proxy is given special information that allows it to translate a ciphertext under one… (More)
  • figure 1
Is this relevant?
Highly Cited
2005
Highly Cited
2005
We describe two new public key broadcast encryption systems for stateless receivers. Both systems are fully secure against any… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
A new public key encryption scheme, along with several variants, is proposed and analyzed. The scheme and its variants are quite… (More)
Is this relevant?
Highly Cited
1999
Highly Cited
1999
We introduce the notion ofnon-malleable noninteractive zero-knowledge (NIZK) proof systems. We show how to transform any ordinary… (More)
Is this relevant?
Highly Cited
1990
Highly Cited
1990
We show how to construct a public-key cryptosystem (as originally defined by Diffie and Hellman) secure against chosen ciphertext… (More)
Is this relevant?