ciphertext

(redirected from Ciphertexts)
Also found in: Dictionary, Thesaurus, Medical, Financial.

ciphertext

[′sī·fər‚tekst]
(communications)
A message which has been transformed by a cipher so that it can be read only by those privy to the secrets of the cipher.

ciphertext

(cryptography)
Text which has been encrypted by some encryption system.

Opposite: plaintext.

ciphertext

Data that has been encrypted for security purposes. See plaintext.
References in periodicals archive ?
Evaluate (C,[c.sub.1](m),[c.sub.2](m),...,cn ( m)): Suppose C is a Boolean circuit and ([c.sub.1](m),[c.sub.2](m),...,cn ( m)) be a tuple of ciphertext. Then, ciphertexts can be evaluated by C as long as the noise growth in the ciphertexts does not exceed the threshold.
It is known that the multiplication operation causes a large noise to ciphertexts compared to addition operation, a user cannot use a multiplication operation if the plaintext-space is not large enough.
case--namely, the ciphertext, the password, and the plaintext.
e) Test algorithm: This is a deterministic algorithm which takes as input the IDERMKS ciphertext I, trapdoor [T.sub.w] and system parameters.
': sign for denoting faulty ciphertext or intermediate values.
achieves an efficient access control mechanism using Constant-size Ciphertext Policy Comparative Attribute-Based Encryption (CCP-CABE) with the support of negative attributes and wildcards.
Therefore, it is natural to require that the ciphertexts be protected by a separate secure channel between Alice and the encryptor.
CP-ABE scheme attaches access policy in ciphertext instead of attributes of accessors.
But the power usage data m; cannot be recovered from the ciphertext [mathematical expression not reproducible], since the reader cannot get the ESP's secret key (p, q).
The [c.sub.j] are called the ciphertext units and we do not perform cancellations between [c.sub.i] and [c.sub.i+1] and the end of each [c.sub.i] is marked, 1 [less than or equal to] i <[less than or equal to] z -1, for example with the symbol "[??]".
This paper takes the former approach, where we do not use a known background model, but assume a known ciphertext model.
Attribute-Based Encryption: In some scenarios, the recipient of the ciphertext is not yet known at the time of the encryption or there are more than one recipient who should be able to decrypt the ciphertext.