Universal amplification of KDM security: from 1-key circular to multi-key KDM (Q6145929): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-031-38545-2_22 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W4385654509 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographic Agility and Its Relation to Circular Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Three’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key-Dependent Message Security: Generic Amplification and Completeness / rank
 
Normal rank
Property / cites work
 
Property / cites work: Black-Box Circular-Secure Encryption beyond Affine Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bounded Key-Dependent Message Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Circular-Secure Encryption from Decision Diffie-Hellman / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Circular Security Counterexamples from Decision Linear and Learning with Errors / rank
 
Normal rank
Property / cites work
 
Property / cites work: Anonymous IBE, leakage resilience and circular security from new assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4413854 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Laconic oblivious transfer and its applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Definitions and Separations for Circular Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2778843 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-based encryption from the Diffie-Hellman assumption / rank
 
Normal rank
Property / cites work
 
Property / cites work: On perfect correctness in (lockable) obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Separating IND-CPA and Circular Security for Unbounded Length Key Cycles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reproducible Circularly-Secure Bit Encryption: Applications and Realizations / rank
 
Normal rank
Property / cites work
 
Property / cites work: CPA-to-CCA transformation for KDM security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Circular security is complete for KDM security / rank
 
Normal rank
Property / cites work
 
Property / cites work: CCA security and trapdoor functions via key-dependent-message security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Separations in Circular Security for Arbitrary Length Key Cycles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key dependent message security and receiver selective opening security for identity-based encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Circular Security Separations for Arbitrary Length Cycles from LWE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: One way functions and pseudorandom generators / rank
 
Normal rank
Property / cites work
 
Property / cites work: New constructions of reusable designated-verifier NIZKs / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Circular Security of Bit-Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035737 / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 11:35, 26 August 2024

scientific article; zbMATH DE number 7799237
Language Label Description Also known as
English
Universal amplification of KDM security: from 1-key circular to multi-key KDM
scientific article; zbMATH DE number 7799237

    Statements

    Universal amplification of KDM security: from 1-key circular to multi-key KDM (English)
    0 references
    0 references
    0 references
    2 February 2024
    0 references
    key dependent message encryption scheme
    0 references
    public-key encryption scheme
    0 references
    symmetric-key bit-encryption
    0 references
    0 references
    0 references
    0 references

    Identifiers