Pages that link to "Item:Q4441904"
From MaRDI portal
The following pages link to Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack (Q4441904):
Displayed 50 items.
- An efficient IBE scheme with tight security reduction in the random oracle model (Q264126) (← links)
- Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing (Q266836) (← links)
- Polly cracker, revisited (Q285245) (← links)
- Two-server password-only authenticated key exchange (Q414937) (← links)
- Possibility and impossibility results for selective decommitments (Q451116) (← links)
- Strongly secure authenticated key exchange from factoring, codes, and lattices (Q494585) (← links)
- An algebraic framework for Diffie-Hellman assumptions (Q514473) (← links)
- Some (in)sufficient conditions for secure hybrid encryption (Q710738) (← links)
- Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption (Q713423) (← links)
- Insight of the protection for data security under selective opening attacks (Q778391) (← links)
- CCA secure encryption supporting authorized equality test on ciphertexts in standard model and its applications (Q778412) (← links)
- Secure public-key encryption scheme without random oracles (Q942322) (← links)
- The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure (Q989522) (← links)
- Improved efficiency of Kiltz07-KEM (Q989584) (← links)
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles (Q1034629) (← links)
- The twin Diffie-Hellman problem and applications (Q1037234) (← links)
- Tight chosen ciphertext attack (CCA)-secure hybrid encryption scheme with full public verifiability (Q1616185) (← links)
- Certifying trapdoor permutations, revisited (Q1629429) (← links)
- Short variable length domain extenders with beyond birthday bound security (Q1633453) (← links)
- Quantum lattice enumeration and tweaking discrete pruning (Q1633464) (← links)
- LWE without modular reduction and improved side-channel attacks against BLISS (Q1633471) (← links)
- Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system (Q1647557) (← links)
- Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing (Q1679904) (← links)
- State separation for code-based game-playing proofs (Q1710673) (← links)
- Towards practical key exchange from ordinary isogeny graphs (Q1710681) (← links)
- Robustly reusable fuzzy extractor from standard assumptions (Q1710686) (← links)
- On the impossibility of structure-preserving deterministic primitives (Q1715860) (← links)
- Efficient public key encryption with equality test in the standard model (Q1725691) (← links)
- HILA5: on reliability, reconciliation, and error correction for Ring LWE encryption (Q1746967) (← links)
- All-but-many encryption (Q1747665) (← links)
- New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem (Q1750339) (← links)
- Robust encryption (Q1753165) (← links)
- DAGS: key encapsulation using dyadic GS codes (Q1755960) (← links)
- A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system (Q1791671) (← links)
- Practical chosen ciphertext secure encryption from factoring (Q1946594) (← links)
- Secure integration of asymmetric and symmetric encryption schemes (Q1946596) (← links)
- Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed? (Q2018816) (← links)
- A post-quantum hybrid encryption based on QC-LDPC codes in the multi-user setting (Q2192382) (← links)
- A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack (Q2267360) (← links)
- The TLS handshake protocol: A modular analysis (Q2267369) (← links)
- Efficient hybrid encryption from ID-based encryption (Q2267789) (← links)
- Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism (Q2269828) (← links)
- Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman (Q2293251) (← links)
- Public key encryption with equality test via hash proof system (Q2330090) (← links)
- Privacy-preserving encryption scheme using DNA parentage test (Q2344762) (← links)
- Compact proofs of retrievability (Q2392096) (← links)
- Improved, black-box, non-malleable encryption from semantic security (Q2413015) (← links)
- Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression (Q2413618) (← links)
- A generic construction of tightly secure signatures in the multi-user setting (Q2419110) (← links)
- Generic constructions of identity-based and certificateless kEMs (Q2425527) (← links)