Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,460,527 papers from all fields of science
Search
Sign In
Create Free Account
Deterministic encryption
A deterministic encryption scheme (as opposed to a probabilistic encryption scheme) is a cryptosystem which always produces the same ciphertext for a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
13 relations
Block cipher
Ciphertext
Convergent encryption
Cryptosystem
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Using Transposition Padding to Get CCA2 Security From Any Deterministic Encryption Schemes
Linming Gong
,
Mingming Wang
,
Xiangjian Zuo
,
Shundong Li
,
Daoshun Wang
IEEE Access
2019
Corpus ID: 59232253
We study how to make any deterministic encryption scheme probabilistic and secure against adaptively chosen ciphertext attacks. A…
Expand
2017
2017
Big Data Privacy Using Fully Homomorphic Non-Deterministic Encryption
Tejas Patil
,
G. K. Patnaik
,
A. T. Bhole
IEEE International Advance Computing Conference
2017
Corpus ID: 32279840
Big data is a large amount of digital information. Now days, data security is a challenging issue that touches several areas…
Expand
2017
2017
Information security analysis of deterministic encryption and chaotic encryption in spatial domain and frequency domain
Z. Ye
,
Hang Yin
,
Yongmao Ye
International Conference on Electrical…
2017
Corpus ID: 34453845
Information security is crucial to data storage and transmission, which is necessary to protect information under various hostile…
Expand
Review
2017
Review
2017
Big Data Analysis And Deterministic Encryption Challenges
A. Shafi
,
S. Shah
2017
Corpus ID: 67093310
Over the past decade, big data analysis has seen an exponential growth and will certainly continue to witness spectacular…
Expand
2015
2015
Property Preserving Symmetric Encryption Revisited
S. Chatterjee
,
M. Prem
,
Laxman Das
International Conference on the Theory and…
2015
Corpus ID: 9430236
At EUROCRYPTi¾?2012 Pandey and Rouselakis introduced the notion of property preserving symmetric encryption which enables…
Expand
2012
2012
A Unified Approach to Deterministic Encryption : New Constructions and a Connection to Computational Entropy ( Abstract )
A. Beimel
,
Yuval Ishai
,
E. Kushilevitz
,
I. Orlov
2012
Corpus ID: 52023033
An information-theoretic private information retrieval (PIR) protocol allows a client to retrieve the i-th bit of a database…
Expand
2012
2012
Weakness of provably secure searchable encryption against frequency analysis
T. Suga
,
T. Nishide
,
K. Sakurai
The 5th International Conference on…
2012
Corpus ID: 17119774
There are encryption schemes called searchable encryption schemes. We can prove the security of these schemes based on a security…
Expand
2010
2010
Trade-offs in Private Search
V. Pappas
,
Mariana Raykova
,
B. Vo
,
S. Bellovin
,
Tal Malkin
2010
Corpus ID: 11935363
Encrypted search — performing queries on protected data — is a well researched problem. However, existing solutions have inherent…
Expand
1998
1998
Safety deterministic encryption key generation system and method
ガイ・エル・フィールダー
,
ポール・エヌ・アリト
1998
Corpus ID: 57798879
(57) [summary] to disclose the encryption key generator having a high resistance to cryptanalysis or brute force attack. Further…
Expand
1988
1988
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Gérard Cohen
,
Marc Giusti
,
T. Mora
Lecture Notes in Computer Science
1988
Corpus ID: 1816878
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE