For Full-Text PDF, please login, if you are a member of IEICE,|
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
On the Security of Keyed-Homomorphic PKE: Preventing Key Recovery Attacks and Ciphertext Validity Attacks
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Full Text: PDF(109.4KB)