Skip to search formSkip to main contentSkip to account menu

Deterministic encryption

A deterministic encryption scheme (as opposed to a probabilistic encryption scheme) is a cryptosystem which always produces the same ciphertext for a… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
We study how to make any deterministic encryption scheme probabilistic and secure against adaptively chosen ciphertext attacks. A… 
2017
2017
Big data is a large amount of digital information. Now days, data security is a challenging issue that touches several areas… 
2017
2017
Information security is crucial to data storage and transmission, which is necessary to protect information under various hostile… 
Review
2017
Review
2017
Over the past decade, big data analysis has seen an exponential growth and will certainly continue to witness spectacular… 
2015
2015
At EUROCRYPTi¾?2012 Pandey and Rouselakis introduced the notion of property preserving symmetric encryption which enables… 
2012
2012
An information-theoretic private information retrieval (PIR) protocol allows a client to retrieve the i-th bit of a database… 
2012
2012
There are encryption schemes called searchable encryption schemes. We can prove the security of these schemes based on a security… 
2010
2010
Encrypted search — performing queries on protected data — is a well researched problem. However, existing solutions have inherent… 
1998
1998
(57) [summary] to disclose the encryption key generator having a high resistance to cryptanalysis or brute force attack. Further…