A unified approach to deterministic encryption: new constructions and a connection to computational entropy (Q2516532): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s00145-013-9174-5 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2058720478 / rank
 
Normal rank
Property / Wikidata QID
 
Property / Wikidata QID: Q123313220 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Message-Locked Encryption for Lock-Dependent Messages / rank
 
Normal rank
Property / cites work
 
Property / cites work: RSA and Rabin Functions: Certain Parts are as Hard as the Whole / rank
 
Normal rank
Property / cites work
 
Property / cites work: Approximation, Randomization, and Combinatorial Optimization.. Algorithms and Techniques / rank
 
Normal rank
Property / cites work
 
Property / cites work: Deterministic and Efficiently Searchable Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hedged Public-Key Encryption: How to Protect against Bad Randomness / rank
 
Normal rank
Property / cites work
 
Property / cites work: Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Instantiating Random Oracles via UCEs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Message-Locked Encryption and Secure Deduplication / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Generate Cryptographically Strong Sequences of Pseudorandom Bits / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting / rank
 
Normal rank
Property / cites work
 
Property / cites work: Paillier's trapdoor function hides up to \(O(n)\) bits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity / rank
 
Normal rank
Property / cites work
 
Property / cites work: Memory Delegation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bounded CCA2-Secure Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Confidential Signatures and Deterministic Signcryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Entropic security in quantum cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data / rank
 
Normal rank
Property / cites work
 
Property / cites work: Correcting errors without leaking partial information / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-malleable extractors and symmetric key cryptography from weak secrets / rank
 
Normal rank
Property / cites work
 
Property / cites work: Overcoming Weak Expectations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: More Constructions of Lossy and Correlation-Secure Trapdoor Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy / rank
 
Normal rank
Property / cites work
 
Property / cites work: Separating succinct non-interactive arguments from all falsifiable assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Probabilistic encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Correlated-Input Secure Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Pseudorandom Generator from any One-way Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Correlated Product Security from Any One-Way Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Fake Auxiliary Input / rank
 
Normal rank
Property / cites work
 
Property / cites work: Derandomized constructions of \(k\)-wise (almost) independent permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Instantiability of RSA-OAEP under Chosen-Plaintext Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: A New Randomness Extraction Paradigm for Hybrid Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographic Extraction and Key Derivation: The HKDF Scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Counterexample to the Chain Rule for Conditional HILL Entropy / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Incremental Deterministic Public-Key Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3752293 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Randomness is linear in space / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lossy trapdoor functions and their applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lossy Trapdoor Functions and Their Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Some Notions of Entropy for Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: A method for obtaining digital signatures and public-key cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Chosen-Ciphertext Security via Correlated Products / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to fool an unbounded adversary with a short key / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Provable Security of an Efficient RSA-Based Pseudorandom Generator / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Uniform Min-Max Theorem with Applications in Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Dual Projective Hashing and Its Applications — Lossy Trapdoor Functions and More / rank
 
Normal rank
Property / cites work
 
Property / cites work: Barriers in cryptography with weak, correlated and leaky sources / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simulating BPP using a general weak random source / rank
 
Normal rank

Latest revision as of 15:24, 10 July 2024

scientific article
Language Label Description Also known as
English
A unified approach to deterministic encryption: new constructions and a connection to computational entropy
scientific article

    Statements

    A unified approach to deterministic encryption: new constructions and a connection to computational entropy (English)
    0 references
    0 references
    0 references
    0 references
    3 August 2015
    0 references
    deterministic encryption
    0 references
    trapdoor functions
    0 references
    hardcore functions
    0 references
    computational entropy
    0 references
    information leakage
    0 references
    \(q\)-Bounded security
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers