Probabilistic encryption

From MaRDI portal
Revision as of 23:35, 30 January 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:1057832

DOI10.1016/0022-0000(84)90070-9zbMath0563.94013OpenAlexW4210300416WikidataQ30051773 ScholiaQ30051773MaRDI QIDQ1057832

Silvio Micali

Publication date: 1984

Published in: Journal of Computer and System Sciences (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1016/0022-0000(84)90070-9




Related Items (only showing first 100 items - show all)

Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear GroupsBeyond the Csiszár-Körner bound: best-possible wiretap coding via obfuscationOn-line/off-line DCR-based homomorphic encryption and applicationsEfficient Dynamic-Resharing “Verifiable Secret Sharing” against mobile adversaryA new security notion for PKC in the standard model: weaker, simpler, and still realizing secure channelsHomomorphic encryption: a mathematical surveyThreshold linearly homomorphic encryption on \(\mathrm{Z}/2^k\mathrm{Z}\)PAC privacy: automatic privacy measurement and control of data processingOne-way functions and the hardness of (probabilistic) time-bounded Kolmogorov complexity w.r.t. samplable distributionsCryptography and Digital TransformationSecuring approximate homomorphic encryption using differential privacyBeyond software watermarking: traitor-tracing for pseudorandom functionsBeyond the Csiszár-Korner bound: best-possible wiretap coding via obfuscationLifting standard model reductions to common setup assumptionsInstantiability of classical random-oracle-model encryption transformsCategorical composable cryptographyOn Privacy Models for RFIDHow to Build a Hash Function from Any Collision-Resistant FunctionChasing Diagrams in CryptographyTesting problems with sublearning sample complexityLayout Randomization and NondeterminismOn the statistical properties of Diffie-Hellman distributionsChosen-Ciphertext Secure Fully Homomorphic EncryptionSeparating IND-CPA and Circular Security for Unbounded Length Key CyclesOn the Multi-output Filtering Model and Its ApplicationsQuantifying information flow in cryptographic systemsA fair and efficient solution to the socialist millionaires' problemOn the Black-box Use of Somewhat Homomorphic Encryption in NonInteractive Two-Party ProtocolsPseudorandom generators without the XOR lemmaThe truth behind the myth of the folk theoremOn Extension of Evaluation Algorithms in Keyed-Homomorphic EncryptionNo-signaling linear PCPsEquivalence Between Non-malleability Against Replayable CCA and Other RCCA-Security NotionsCocks’ Identity-Based Encryption in the Standard Model, via Obfuscation Techniques (Short Paper)Development on security models for proxy re-encryption schemesThreshold secret sharing with geometric algebrasA duality between one-way functions and average-case symmetry of informationNP-hardness of approximating meta-complexity: a cryptographic approachAnother look at automated theorem-provingCryptography and Game Theory: Designing Protocols for Exchanging InformationRound-optimal secure multi-party computationNo-signaling linear PCPsSimulation-based receiver selective opening CCA secure PKE from standard computational assumptionsOblivious signature-based envelopeTowards Key-Dependent Message Security in the Standard ModelNew Anonymity Notions for Identity-Based EncryptionNew Anonymity Notions for Identity-Based EncryptionConstant-Round Nonmalleable Commitments from Any One-Way FunctionSome Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk)Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature SchemeGeneralized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman ProblemA CCA Secure Hybrid Damgård’s ElGamal EncryptionMulti-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input SettingA Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees ProtocolA Public-Key Encryption Scheme with Pseudo-random CiphertextsCryptographically Sound Security Proofs for Basic and Public-Key KerberosTowards a Theory of Intrusion DetectionOn the possibility of basing cryptography on \(\mathsf{EXP}\ne \mathsf{BPP} \)MoSS: modular security specifications frameworkA probabilistic polynomial-time process calculus for the analysis of cryptographic protocolsSuccinct non-interactive arguments via linear interactive proofsAn efficient CCA-secure cryptosystem over ideal lattices from identity-based encryptionOn the analysis of cryptographic assumptions in the generic ring modelMore efficient DDH pseudorandom generatorsA note on perfect correctness by derandomizationReport and trace ring signaturesHow to construct secure proxy cryptosystemConstructive \(t\)-secure homomorphic secret sharing for low degree polynomialsCCA secure \textit{a posteriori} openable encryption in the standard modelFully leakage-resilient signaturesEnhancements of trapdoor permutationsSecret-sharing for NPEfficient cryptosystems from \(2^k\)-th power residue symbolsUnnamed ItemNaor-Yung paradigm with shared randomness and applicationsRandom algebraic lattices and codes for wireless communicationsSecure multiparty computation with sublinear preprocessingSingle-server private information retrieval with sublinear amortized timeAnamorphic encryption: private communication against a dictatorToward non-interactive zero-knowledge proofs for NP from LWEOn the power of rewinding simulators in functional encryptionCryptHOL: game-based proofs in higher-order logicA black-box construction of fully-simulatable, round-optimal oblivious transfer from strongly uniform key agreementReconciling non-malleability with homomorphic encryptionInstantiability of RSA-OAEP under chosen-plaintext attackPrivacy-preserving Krawtchouk moment feature extraction over encrypted image dataOblivious Transfer from Weakly Random Self-Reducible Public-Key CryptosystemUniversally composable symbolic security analysisPractical chosen ciphertext secure encryption from factoringSecure integration of asymmetric and symmetric encryption schemesHomomorphic public-key cryptosystems and encrypting Boolean circuitsCertain sequence of arithmetic progressions and a new key sharing methodNon-malleable encryption: simpler, shorter, strongerSecurity models and proof strategies for plaintext-aware encryptionComputational indistinguishability: A sample hierarchyResource-aware protocols for authenticated group key exchange in integrated wired and wireless networksSecure distributed constraint satisfaction: reaching agreement without revealing private informationDeveloping the concept of one-way functions for cryptographic security systems using achievements in chaotic dynamicsExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationThe reactive simulatability (RSIM) framework for asynchronous systems




Cites Work




This page was built for publication: Probabilistic encryption