Identification Schemes from Key Encapsulation Mechanisms
Publication:3011903
DOI10.1007/978-3-642-21969-6_4zbMath1280.94103OpenAlexW1570949899MaRDI QIDQ3011903
Publication date: 29 June 2011
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-21969-6_4
key encapsulation mechanismidentification schemecomputational Diffie-Hellman assumptionconcurrent man-in-the-middle attackone-way-CCA security
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.) (68Q85) Authentication, digital signatures and secret sharing (94A62)
Related Items (2)
Cites Work
- The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure
- New Constructions of Efficient Simulation-Sound Commitments Using Encryption and Their Applications
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
- The Knowledge Complexity of Interactive Proof Systems
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks
- Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology – CRYPTO 2004
- The Twin Diffie-Hellman Problem and Applications
- Theory of Cryptography
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Identification Schemes from Key Encapsulation Mechanisms