Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Deterministic encryption

A deterministic encryption scheme (as opposed to a probabilistic encryption scheme) is a cryptosystem which always produces the same ciphertext for a… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Homomorphic computing has been suggested as a method to secure processing in insecure servers. One of the drawbacks of… Expand
  • figure 1
  • table I
  • figure 3
  • figure 4
  • table III
Is this relevant?
Highly Cited
2014
Highly Cited
2014
Searchable (symmetric) encryption allows encryption while still enabling search for keywords. Its immediate application is cloud… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2013
Highly Cited
2013
We formalize a new cryptographic primitive that we call Message-Locked Encryption (MLE), where the key under which encryption and… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2013
Highly Cited
2013
This work presents the design and analysis of the first searchable symmetric encryption (SSE) protocol that supports conjunctive… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 6
Is this relevant?
2012
2012
Motivated by applications in large storage systems, we initiate the study of incremental deterministic public-key encryption… Expand
Is this relevant?
2012
2012
We propose a general construction of deterministic encryption schemes that unifies prior work and gives novel schemes… Expand
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Deterministic public-key encryption, introduced by Bellare, Boldyreva, and O’Neill (CRYPTO ’07), provides an alternative to… Expand
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In practice, randomness may be of… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2008
Highly Cited
2008
We strengthen the foundations of deterministic public-key encryption via definitional equivalences and standard-model constructs… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
The study of deterministic public-key encryption was initiated by Bellare et al. (CRYPTO '07), who provided the "strongest… Expand
  • figure 1
  • figure 2
  • figure 4
Is this relevant?