Also found in: Thesaurus, Medical, Legal, Financial, Encyclopedia, Wikipedia.


A text in encrypted form, as opposed to the plaintext.
American Heritage® Dictionary of the English Language, Fifth Edition. Copyright © 2016 by Houghton Mifflin Harcourt Publishing Company. Published by Houghton Mifflin Harcourt Publishing Company. All rights reserved.


encrypted text
Collins English Dictionary – Complete and Unabridged, 12th Edition 2014 © HarperCollins Publishers 1991, 1994, 1998, 2000, 2003, 2006, 2007, 2009, 2011, 2014


(ˈsaɪ fərˌtɛkst)

the encoded version of a message or other text, as opposed to the plaintext.
Random House Kernerman Webster's College Dictionary, © 2010 K Dictionaries Ltd. Copyright 2005, 1997, 1991 by Random House, Inc. All rights reserved.
Mentioned in ?
References in periodicals archive ?
Message confidentiality typically means that a sender encrypts the message to be transmitted using the session key through symmetric cryptography; then, the session key is encrypted employing a receiver's public key; finally, the resulting ciphertext is sent with the encrypted symmetric key (ESK) to the receiver.
Furthermore, as all of the existing schemes based on the blueprint of Gentry's scheme, each ciphertext generated has noise attached for security reason.
Whenever a homomorphic operation is applied, some noise will be added into the ciphertext and then the ciphertext-size increases.
infeasible to determine whether a ciphertext is an encryption of
With this, the same data becomes the same ciphertext after encryption, and it enables the cloud server to deduplicate while ensuring confidentiality.
Cloud encryption is the change of a cloud benefit client's information into ciphertext. Cloud encryption is practically indistinguishable to in-house encryption with one vital contrast that the cloud client must set aside opportunity to find out about the supplier's strategies and methodology for encryption and encryption key administration.
Most of the existing CP-ABE scheme uses bilinear maps and generates secret keys and ciphertext of large size.
The cipher will then be XOR-ed with plaintext to produce the ciphertext. For the A5/1 stream cipher, the secret key produced will eventually XOR-ed with 228-bit frames of GSM conversation which are transmitted every 4.6 milliseconds [27,28].
The algorithm will encrypt M and create a ciphertext CT such that only a user that possesses a set of attributes that satisfies the access structure will be able to decrypt the message.
To be compatible with the data aggregation, we also propose a linearly homomorphic signature scheme which is used to sign the ciphertext of metering data.