Keyword : chosen-ciphertext attack


Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs
Manh Ha NGUYEN Kenji YASUNAGA Keisuke TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/06/01
Vol. E96-A  No. 6 ; pp. 1100-1111
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
public key encryptionhash proof systemkey-leakagechosen-ciphertext attack
 Summary | Full Text:PDF

Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme
Jian WENG Min-Rong CHEN Kefei CHEN Robert H. DENG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/04/01
Vol. E93-A  No. 4 ; pp. 854-856
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
hierarchial identity-based encryptionchosen-ciphertext attackchosen-plaintext attack
 Summary | Full Text:PDF

On the Security of a Conditional Proxy Re-Encryption
Xi ZHANG Min-Rong CHEN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/10/01
Vol. E92-A  No. 10 ; pp. 2644-2647
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
conditional proxy re-encryptionchosen-ciphertext attackcryptanalysis
 Summary | Full Text:PDF

Relations among Security Goals of Probabilistic Public-Key Cryptosystems
Ako SUZUKI Yuichi KAJI Hajime WATANABE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1 ; pp. 172-178
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
probabilistic public-key encryption schemeschosen-plaintext attackchosen-ciphertext attackequivalence undecidabilitynon-verifiability
 Summary | Full Text:PDF

A Refined Definition of Semantic Security for Public-Key Encryption Schemes
Hideaki SAKAI Noriko NAKAMURA Yoshihide IGARASHI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2001/01/01
Vol. E84-D  No. 1 ; pp. 34-39
Type of Manuscript:  Special Section PAPER (Special Issue on Selected Papers from LA Symposium)
Category: 
Keyword: 
chosen-ciphertext attackindistinguishabilityinformation securitychosen-plaintext attackpublic-key encryptionsemantic security
 Summary | Full Text:PDF