E Fujisaki, T Okamoto - Annual international cryptology conference, 1999 - Springer
This paper shows a generic and simple conversion from weak asymmetric and symmetric encryption schemes into an asymmetric encryption scheme which is secure in a very strong …
E Fujisaki, T Okamoto - Journal of cryptology, 2013 - Springer
This paper presents a generic conversion from weak asymmetric and symmetric encryption schemes to an asymmetric encryption scheme that is chosen-ciphertext secure in the …
T Okamoto, D Pointcheval - Topics in Cryptology—CT-RSA 2001: The …, 2001 - Springer
Seven years after the optimal asymmetric encryption padding (OAEP) which makes chosen- ciphertext secure encryption scheme from any trapdoor one-way permutation (but whose …
Data aggregation is an important method to reduce the energy consumption in wireless sensor networks (WSNs), however, performing data aggregation while preserving data …
S Dhall, SK Pal, K Sharma - Journal of King Saud University-Computer and …, 2022 - Elsevier
Traditional encryption is based on secrecy provided by secret-key. But this leads to generation of same cipher text when the encryption scheme is applied to same plaintext with …
J Sen - Theory and practice of cryptography and network …, 2013 - books.google.com
Thedemandforprivacyofdigitaldataandofalg… have increased exponentially over the last decade. This goes in parallel with the growth in communication networks and theirdevices …
J Li, MJ Atallah - 2006 International Conference on …, 2006 - ieeexplore.ieee.org
The growth of the Internet has created tremendous opportunities for online collaborations. These often involve collaborative optimizations where the two parties are, for example …
AW Dent - Cryptology ePrint Archive, 2004 - eprint.iacr.org
This paper examines the methods in which the ideas behind a KEM--DEM hybrid encryption scheme can be extended to other types of asymmetric primitives, particularly to signcryption …
In an open environment such as the Internet, the decision to collaborate with a stranger (eg, by granting access to a resource) is often based on the characteristics (rather than the …