Deterministic encryption

A deterministic encryption scheme (as opposed to a probabilistic encryption scheme) is a cryptosystem which always produces the same ciphertext for a… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2006-2018
051020062018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
This paper presents three curious findings about deterministic public-key encryption (D-PKE) that further our understanding of… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2014
Highly Cited
2014
Searchable (symmetric) encryption allows encryption while still enabling search for keywords. Its immediate application is cloud… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2014
Highly Cited
2014
We propose the first construction for achieving adaptively secure functional encryption (FE) for polysized circuits (without… (More)
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2012
Highly Cited
2012
We formalize a new cryptographic primitive, Message-Locked Encryption (MLE), where the key under which encryption and decryption… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2012
2012
This paper addresses deterministic public-key encryption schemes (DE), which are designed to provide meaningful security when… (More)
Is this relevant?
2012
2012
Motivated by applications in large storage systems, we initiate the study of incremental deterministic public-key encryption… (More)
  • figure 1
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In practice, randomness may be of… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2009
2009
We analyze the security of the Thorp shuffle, or, equivalently, a maximally unbalanced Feistel network. Roughly said, the Thorp… (More)
Is this relevant?
Highly Cited
2008
Highly Cited
2008
We strengthen the foundations of deterministic public-key encryption via definitional equivalences<lb>and standard-model… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
The study of deterministic public-key encryption was initiated by Bellare et al. (CRYPTO ’07), who provided the “strongest… (More)
  • figure 1
  • figure 2
  • figure 4
Is this relevant?