author: rosario gennaro

Advances in Cryptology -- CRYPTO 2014: 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I

... generator is a PPT algorithm G, that on input of a security parameter 1* outputs a tuple of the form AMG | := (k, G, GT, e, p, P, PT) 4— go (1*) where G, GT are descriptions of cyclic groups of prime order p, log p = €3(A), T' is a ...

Advances in Cryptology -- CRYPTO 2014: 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II

... Definition 7 (Least common denominator of a rational access function). The least common denominator M(Φ) of a rational access function Φ is the least common denominator of the values of Φ. Definition 8 (Uniform access function). An ...

Public Key Cryptography -- PKC 2011: 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011, Proceedings

... decryption oracle in the mixed CCA experiment accepts the queries. For example, (s2p3) denotes two single decryption queries followed by three parallel decryption queries. We denote by “unbound” a special sequence that indicates ...

This website uses cookies and collects data for optimal performance. Your continued use signifies agreement to our Privacy Policy.