Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption

From MaRDI portal
Revision as of 03:47, 5 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3600382

DOI10.1007/978-3-540-89255-7_19zbMath1206.94070OpenAlexW1542889080MaRDI QIDQ3600382

Goichiro Hanaoka, Kaoru Kurosawa

Publication date: 10 February 2009

Published in: Advances in Cryptology - ASIACRYPT 2008 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-89255-7_19




Related Items (18)

Tight chosen ciphertext attack (CCA)-secure hybrid encryption scheme with full public verifiabilityChosen ciphertext secure keyed-homomorphic public-key cryptosystemsPractical chosen ciphertext secure encryption from factoringStrongly secure authenticated key exchange from factoring, codes, and latticesIdentification Schemes from Key Encapsulation MechanismsChosen Ciphertext Secure Keyed-Homomorphic Public-Key EncryptionKey Encapsulation Mechanisms from Extractable Hash Proof Systems, RevisitedToward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman AssumptionEfficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman AssumptionThe Twin Diffie-Hellman Problem and ApplicationsAn Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE TransformationsPractical Chosen Ciphertext Secure Encryption from FactoringMulti-recipient Public-Key Encryption from Simulators in Security ProofsToward Compact Public Key Encryption Based on CDH Assumption via Extended Twin DH AssumptionThe twin Diffie-Hellman problem and applicationsA Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search ProblemsChosen ciphertext security from injective trapdoor functionsGeneric transformation from broadcast encryption to round-optimal deniable ring authentication


Uses Software



Cites Work




This page was built for publication: Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption