Skip to search formSkip to main contentSkip to account menu

Semantic security

Known as: Semantically secure, Semantically-secure 
In cryptography, a cryptosystem is semantically secure if any probabilistic, polynomial-time algorithm (PPTA) that is given the ciphertext of a… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
We demonstrate a simple, statistically secure, ORAM with computational overhead $\tilde{O}(\log^2 n)$; previous ORAM protocols… 
2012
2012
Private Stream Search allows users to perform keyword-based queries to a database without revealing any information about the… 
2011
2011
Compressive sensing (CS) has recently attracted much attention due to its unique feature of directly and simultaneously acquiring… 
2011
2011
Cloud computing poses several new security andprivacy challenges, mainly related to resource sharing, interoperabilityand… 
2010
2010
  • M. Hirt
  • 2010
  • Corpus ID: 11356854
We present a K-out-of-L voting scheme, i.e., a voting scheme that allows every voter to vote for (up to) K candidates from a set… 
Highly Cited
2009
Highly Cited
2009
Location privacy of mobile users (MUs) in wireless communication networks is very important. Ensuring location privacy for an MU… 
2007
2007
Motivation -- The task of creative product/commercial design can be supported by the retrieval of inspirational images from… 
2006
2006
Client-to-client password authenticated key exchange (C2C-PAKE) protocol deals with the authenticated key exchange process… 
2001
2001
This study uses the concept of "emergent texture" to analyze the corpus behavior of the four nominal demonstratives -- this, that…