CPA-to-CCA transformation for KDM security (Q2175934): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by one other user not shown)
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-030-36033-7_5 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2989758142 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Soundness of Formal Encryption in the Presence of Key-Cycles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key-Dependent Message Security: Generic Amplification and Completeness / rank
 
Normal rank
Property / cites work
 
Property / cites work: Garbling XOR Gates “For Free” in the Standard Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bounded Key-Dependent Message Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249318 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4413854 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249316 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Circular-Secure Encryption from Decision Diffie-Hellman / rank
 
Normal rank
Property / cites work
 
Property / cites work: Homomorphic secret sharing from lattices without FHE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability / rank
 
Normal rank
Property / cites work
 
Property / cites work: Anonymous IBE, leakage resilience and circular security from new assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4409110 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fiat-Shamir: from practice to theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fiat-Shamir and correlation intractability from strong KDM-secure encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737235 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification / rank
 
Normal rank
Property / cites work
 
Property / cites work: New constructions of identity-based and key-dependent message secure encryption schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-Resilience / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully homomorphic encryption using ideal lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards a Separation of Semantic and CCA Security for Public Key Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reproducible Circularly-Secure Bit Encryption: Applications and Realizations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Completeness of Single-Bit Projection-KDM Security for Public Key Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: CCA security and trapdoor functions via key-dependent-message security / rank
 
Normal rank
Property / cites work
 
Property / cites work: A framework for achieving KDM-CCA secure public-key encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key dependent message security and receiver selective opening security for identity-based encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: New constructions of reusable designated-verifier NIZKs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035737 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN / rank
 
Normal rank

Latest revision as of 13:21, 22 July 2024

scientific article
Language Label Description Also known as
English
CPA-to-CCA transformation for KDM security
scientific article

    Statements

    CPA-to-CCA transformation for KDM security (English)
    0 references
    0 references
    0 references
    30 April 2020
    0 references
    public-key encryption
    0 references
    key-dependent message security
    0 references
    chosen ciphertext security
    0 references
    designated-verifier non-interactive zero-knowledge argument
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers