Simulation-based selective opening security for receivers under chosen-ciphertext attacks (Q2416939): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(3 intermediate revisions by 3 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / Wikidata QID
 
Property / Wikidata QID: Q121743217 / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s10623-018-0530-1 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2887173992 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Encryption Secure against Selective Opening Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: Generic constructions of identity-based and certificateless kEMs / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Definitions of Selective Opening Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: All-but-many lossy trapdoor functions from lattices and applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249317 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737235 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Selective Opening Security for Receivers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Selective Opening Security from Simulatable Data Encapsulation / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Selective Opening Security of Practical Public-Key Encryption Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: All-But-Many Lossy Trapdoor Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts / rank
 
Normal rank
Property / cites work
 
Property / cites work: Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks / rank
 
Normal rank
Property / cites work
 
Property / cites work: All-but-many lossy trapdoor functions and selective opening chosen-ciphertext security from LWE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities / rank
 
Normal rank

Latest revision as of 09:04, 19 July 2024

scientific article
Language Label Description Also known as
English
Simulation-based selective opening security for receivers under chosen-ciphertext attacks
scientific article

    Statements

    Simulation-based selective opening security for receivers under chosen-ciphertext attacks (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    24 May 2019
    0 references
    simulation-based security
    0 references
    selective opening security for receivers
    0 references
    chosen-ciphertext attacks
    0 references
    public-key encryption
    0 references
    identity-based encryption
    0 references
    0 references
    0 references
    0 references

    Identifiers