Keyword : semantic security


Attribute Revocable Attribute-Based Encryption with Forward Secrecy for Fine-Grained Access Control of Shared Data
Yoshiaki SHIRAISHI Kenta NOMURA Masami MOHRI Takeru NARUSE Masakatu MORII 
Publication:   
Publication Date: 2017/10/01
Vol. E100-D  No. 10 ; pp. 2432-2439
Type of Manuscript:  Special Section PAPER (Special Section on Advanced Log Processing and Office Information Systems)
Category: 
Keyword: 
cryptographic cloud storageciphertext-policy attribute-based encryptionsemantic securityattribute revocationproxy re-encryption
 Summary | Full Text:PDF

Managing Encryption and Key Publication Independently in Digital Rights Management Systems
Goichiro HANAOKA Kazuto OGAWA Itsuro MUROTA Go OHTAKE Keigo MAJIMA Seiichi GOHSHI Kimiyuki OYAMADA Seiichi NAMBA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1 ; pp. 160-172
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Applications
Keyword: 
digital rights management systemscopyright protectionsemantic securityadaptive attacks
 Summary | Full Text:PDF

Semantically Secure McEliece Public-Key Cryptosystem
Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1 ; pp. 74-83
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
McEliece public-key cryptosystemsemantic securityprovable securityconversioncoding theory
 Summary | Full Text:PDF

A Refined Definition of Semantic Security for Public-Key Encryption Schemes
Hideaki SAKAI Noriko NAKAMURA Yoshihide IGARASHI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2001/01/01
Vol. E84-D  No. 1 ; pp. 34-39
Type of Manuscript:  Special Section PAPER (Special Issue on Selected Papers from LA Symposium)
Category: 
Keyword: 
chosen-ciphertext attackindistinguishabilityinformation securitychosen-plaintext attackpublic-key encryptionsemantic security
 Summary | Full Text:PDF