Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Quadratic residuosity problem

Known as: Quadratic residuacity problem, Quadratic residuocity problem 
The quadratic residuosity problem in computational number theory is to decide, given integers and , whether is a quadratic residue modulo or not.Here… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Existing privacy preserving schemes have attained maximum privacy level either using the exponential modular operations or the… Expand
Is this relevant?
2014
2014
Three approaches are currently used for devising identity-based encryption schemes. They build on pairings, quadratic residues… Expand
Is this relevant?
2010
2010
We propose new and improved instantiations of lossy trapdoor functions (Peikert and Waters, STOC ’08), and correlation-secure… Expand
Is this relevant?
2009
2009
We introduce the first universally anonymous, thus key-private, IBE whose security is based on the standard quadratic residuosity… Expand
  • figure 1
  • figure 2
Is this relevant?
2007
2007
In this paper, we study the quadratic residuosity problem (QRP). Using the methods of integer classification, we give formulae of… Expand
Is this relevant?
2005
2005
We present a general framework for constructing two-message oblivious transfer protocols using a modification of Cramer and Shoup… Expand
Is this relevant?
2005
2005
An airfoil member for a land vehicle in particular for fixing to the roof of a cab of a tractor-trailer rig, in which the airfoil… Expand
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We present a novel public key cryptosystem in which the public key of a subscriber can be chosen to be a publicly known value… Expand
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We present several new and fairly practical public-key encryption schemes and prove them secure against adaptive chosen… Expand
Is this relevant?
Highly Cited
1997
Highly Cited
1997
We establish the following, quite unexpected, result: replication of data for the computational private information retrieval… Expand
Is this relevant?