{"url":"https://186.hatenablog.com/entry/20081007/1223389741","description":"(Rosen and Segev\u306e) Chosen-Ciphertext Security via Correlated Products\u306e\u8ad6\u6587\u304c\u4fee\u6b63\u3055\u308c\u3066\u3044\u308b\u3088\u3046\u306a\u306e\u3067\u6d41\u3057\u8aad\u307f\u3057\u3066\u3044\u305f\u3089Goldwasser, Vaikuntanathan \u304c Correlation-secure Trapdoor Functions from Lattices \u3068\u3044\u3046\u8ad6\u6587\u3092\u6e96\u5099\u4e2d\u3089\u3057\u3044. CCA2 PKE \u306e\u65b0\u305f\u306a\u69cb\u6210\u6cd5\u306e\u3088\u3046\u3060. \u3068\u3044\u3046\u3053\u3068\u306a\u306e\u3067, Rosen and Segev\u306e\u8ad6\u6587\u3092\u8aad\u307f\u76f4\u3057\u306a\u304c\u3089\u5c0f\u4e00\u6642\u9593\u307b\u3069\u8003\u3048\u305f\u3068\u3053\u308d\u3042\u308b\u4eee\u5b9a\u304b\u3089\u51fa\u6765\u308b\u3053\u3068\u304c\u5206\u304b\u3063\u305f. \u591a\u5206, \u3053\u308c\u3060\u308d\u3046.","height":"190","blog_title":"186 @ hatenablog","image_url":null,"provider_url":"https://hatena.blog","blog_url":"https://186.hatenablog.com/","published":"2008-10-07 23:29:01","author_url":"https://blog.hatena.ne.jp/smoking186/","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2F186.hatenablog.com%2Fentry%2F20081007%2F1223389741\" title=\" \u65b0\u3057\u3044\u683c\u5b50\u30d9\u30fc\u30b9\u306eCCA2 PKE - 186 @ hatenablog\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","width":"100%","categories":["crypt","lattice"],"type":"rich","version":"1.0","provider_name":"Hatena Blog","title":" \u65b0\u3057\u3044\u683c\u5b50\u30d9\u30fc\u30b9\u306eCCA2 PKE","author_name":"smoking186"}