Reproducible Circularly-Secure Bit Encryption: Applications and Realizations (Q3457112): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-662-47989-6_11 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W1467237292 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key-Dependent Message Security: Generic Amplification and Completeness / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bounded Key-Dependent Message Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Deterministic and Efficiently Searchable Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Randomness Re-use in Multi-recipient Encryption Schemeas / rank
 
Normal rank
Property / cites work
 
Property / cites work: Randomness-Dependent Message Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Chosen‐Ciphertext Security from Identity‐Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability / rank
 
Normal rank
Property / cites work
 
Property / cites work: Black-Box Circular-Secure Encryption beyond Affine Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lossy trapdoor functions from homomorphic reproducible encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data / rank
 
Normal rank
Property / cites work
 
Property / cites work: More constructions of lossy and correlation-secure trapdoor functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards a Separation of Semantic and CCA Security for Public Key Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Circuit-Size Independent Public Key Encryption with KDM Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Randomness is linear in space / rank
 
Normal rank
Property / cites work
 
Property / cites work: Chosen-Ciphertext Security via Correlated Products / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Circular Security of Bit-Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Two Is a Crowd? A Black-Box Separation of One-Wayness and Security under Correlated Inputs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- CRYPTO 2008. 28th annual international cryptology conference, Santa Barbara, CA, USA, August 17--21, 2008. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Dual Projective Hashing and Its Applications — Lossy Trapdoor Functions and More / rank
 
Normal rank

Latest revision as of 04:20, 11 July 2024

scientific article
Language Label Description Also known as
English
Reproducible Circularly-Secure Bit Encryption: Applications and Realizations
scientific article

    Statements

    Reproducible Circularly-Secure Bit Encryption: Applications and Realizations (English)
    0 references
    0 references
    0 references
    10 December 2015
    0 references
    circular security
    0 references
    correlated-input security
    0 references
    trapdoor functions
    0 references
    (non-)shielding CCA construction
    0 references
    deterministic encryption
    0 references

    Identifiers