Pages that link to "Item:Q3582745"
From MaRDI portal
The following pages link to Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability (Q3582745):
Displaying 45 items.
- Signature schemes secure against hard-to-invert leakage (Q290397) (← links)
- Leakage-resilient cryptography from minimal assumptions (Q315546) (← links)
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model (Q729893) (← links)
- Key-dependent message security: generic amplification and completeness (Q744344) (← links)
- Better security for deterministic public-key encryption: the auxiliary-input setting (Q744600) (← links)
- Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks (Q893862) (← links)
- Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model (Q893865) (← links)
- Regular lossy functions and their applications in leakage-resilient cryptography (Q1643156) (← links)
- Fiat-Shamir and correlation intractability from strong KDM-secure encryption (Q1648782) (← links)
- Anonymous IBE, leakage resilience and circular security from new assumptions (Q1648813) (← links)
- Reproducible circularly secure bit encryption: applications and realizations (Q1698399) (← links)
- Leakage-resilient cryptography from puncturable primitives and obfuscation (Q1710617) (← links)
- Leakage resilient one-way functions: the auxiliary-input setting (Q1784737) (← links)
- New constructions of statistical NIZKs: dual-mode DV-NIZKs and more (Q2055662) (← links)
- The rise of Paillier: homomorphic secret sharing and public-key silent OT (Q2056710) (← links)
- Rate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacks (Q2061928) (← links)
- Non-interactive batch arguments for NP from standard assumptions (Q2139642) (← links)
- CPA-to-CCA transformation for KDM security (Q2175934) (← links)
- KDM security for identity-based encryption: constructions and separations (Q2215124) (← links)
- Fully leakage-resilient signatures (Q2392093) (← links)
- Naor-Yung paradigm with shared randomness and applications (Q2401764) (← links)
- Public key encryption resilient to leakage and tampering attacks (Q2402358) (← links)
- Laconic private set intersection and applications (Q2697887) (← links)
- Updatable public key encryption in the standard model (Q2697895) (← links)
- Completeness of Single-Bit Projection-KDM Security for Public Key Encryption (Q2790040) (← links)
- Naor-Yung Paradigm with Shared Randomness and Applications (Q2827710) (← links)
- Signatures Resilient to Uninvertible Leakage (Q2827729) (← links)
- Bounded KDM Security from iO and OWF (Q2827740) (← links)
- Three’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE (Q2829234) (← links)
- Circular Security Separations for Arbitrary Length Cycles from LWE (Q2829235) (← links)
- Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions (Q2953781) (← links)
- Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage (Q2953868) (← links)
- Key-Dependent Message Security for Division Function: Discouraging Anonymous Credential Sharing (Q3092366) (← links)
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting (Q3179355) (← links)
- Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation (Q3448807) (← links)
- Fully Homomorphic Encryption with Auxiliary Inputs (Q3454587) (← links)
- Reproducible Circularly-Secure Bit Encryption: Applications and Realizations (Q3457112) (← links)
- Garbled Circuits as Randomized Encodings of Functions: a Primer (Q5021129) (← links)
- Master-Key KDM-Secure IBE from Pairings (Q5041155) (← links)
- Almost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and More (Q5041173) (← links)
- The KDM-CCA Security of REACT (Q5056009) (← links)
- Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption (Q5267417) (← links)
- Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions (Q5267418) (← links)
- Separating IND-CPA and Circular Security for Unbounded Length Key Cycles (Q5738789) (← links)
- CCA security and trapdoor functions via key-dependent-message security (Q5918652) (← links)