loading
Documentation
  • Login
  • Sign-Up

Research.Publish.Connect.

Paper

Author: Marc Joye

Affiliation: Technicolor, United States

ISBN: 978-989-758-117-5

Keyword(s): Public-Key Encryption, Key Privacy, Quadratic Residuosity.

Related Ontology Subjects/Areas/Topics: Applied Cryptography ; Cryptographic Techniques and Key Management ; Data and Application Security and Privacy ; Data Engineering ; Database Security and Privacy ; Databases and Data Security ; Information and Systems Security ; Privacy ; Security in Information Systems

Abstract: This paper presents a key-private public-key cryptosystem. More specifically, in addition to confidentiality, it provides privacy. Informally, ciphertexts yield no information whatsoever about its recipient (beyond what is publicly known). The presented cryptosystem also features a very fast key generation: the key generation boils down to a mere squaring modulo an RSA modulus. Further, it comes with strong security guarantees: it is proved to be semantically secure and key-private under the standard quadratic residuosity assumption.

PDF ImageFull Text

Download
Sign In Guest: Register as new SCITEPRESS user or Join INSTICC now for free.

Sign In SCITEPRESS user: please login.

Sign In INSTICC Members: please login. If not a member yet, Join INSTICC now for free.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 23.20.64.16. INSTICC members have higher download limits (free membership now)

In the current month:
Recent papers: 1 available of 1 total
2+ years older papers: 2 available of 2 total

Paper citation in several formats:
Joye M. (2015). A Key-private Cryptosystem from the Quadratic Residuosity.In Proceedings of the 12th International Conference on Security and Cryptography (ICETE 2015)ISBN 978-989-758-117-5, pages 398-404. DOI: 10.5220/0005569703980404

@conference{secrypt15,
author={Marc Joye},
title={A Key-private Cryptosystem from the Quadratic Residuosity},
booktitle={Proceedings of the 12th International Conference on Security and Cryptography (ICETE 2015)},
year={2015},
pages={398-404},
doi={10.5220/0005569703980404},
isbn={978-989-758-117-5},
}

TY - CONF

JO - Proceedings of the 12th International Conference on Security and Cryptography (ICETE 2015)
TI - A Key-private Cryptosystem from the Quadratic Residuosity
SN - 978-989-758-117-5
AU - Joye M.
PY - 2015
SP - 398
EP - 404
DO - 10.5220/0005569703980404

Sorted by: Show papers

Note: The preferred Subjects/Areas/Topics, listed below for each paper, are those that match the selected paper topics and their ontology superclasses.
More...

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.

Show authors

Note: The preferred Subjects/Areas/Topics, listed below for each author, are those that more frequently used in the author's papers.
More...