Semantic security

Known as: Semantically secure, Semantically-secure 
In cryptography, a cryptosystem is semantically secure if any probabilistic, polynomial-time algorithm (PPTA) that is given the ciphertext of a… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1979-2017
020406019792017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
In this paper, we propose a method of detecting and classifying web application attacks. In contrast to current signature-based… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 8
  • figure 12
Is this relevant?
2013
2013
Functional encryption (FE) is a powerful cryptographic primitive that generalizes many asymmetric encryption systems proposed in… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2012
Highly Cited
2012
The wiretap channel is a setting where one aims to provide information-theoretic privacy of communicated data based solely on the… (More)
Is this relevant?
Highly Cited
2010
Highly Cited
2010
In a related-key attack (RKA) an adversary attempts to break a cryptographic primitive by invoking the primitive with several… (More)
  • figure 1
Is this relevant?
2008
2008
In this paper, we formally prove that padding the plaintext with a random bit-string provides the semantic security against… (More)
  • table 1
Is this relevant?
Highly Cited
2006
Highly Cited
2006
In 1977 Dalenius articulated a desideratum for statistical databases: nothing about an individual should be learnable from the… (More)
Is this relevant?
Highly Cited
2004
Highly Cited
2004
A long-standing problem in information security is how to specify and enforce expressive security policies that control… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2004
2004
Probabilistic symmetric encryption have already been widely studied, from a theoretical point of view. Nevertheless, many… (More)
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Security against adaptive chosen ciphertext attacks (or, CCA security) has been accepted as the standard requirement from… (More)
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
1998
Highly Cited
1998
The ElGamal encryption scheme has been proposed several years ago and is one of the few probabilistic encryption schemes. However… (More)
Is this relevant?