Pages that link to "Item:Q3627444"
From MaRDI portal
The following pages link to A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks (Q3627444):
Displaying 40 items.
- Signature schemes secure against hard-to-invert leakage (Q290397) (← links)
- Tightly secure signatures and public-key encryption (Q300383) (← links)
- Round-optimal password-based authenticated key exchange (Q380962) (← links)
- Bounded tamper resilience: how to go beyond the algebraic barrier (Q514469) (← links)
- An algebraic framework for Diffie-Hellman assumptions (Q514473) (← links)
- Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model (Q729893) (← links)
- Key-dependent message security: generic amplification and completeness (Q744344) (← links)
- The key-dependent message security of key-alternating Feistel ciphers (Q826271) (← links)
- Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model (Q893865) (← links)
- Shorter quasi-adaptive NIZK proofs for linear subspaces (Q1698397) (← links)
- Reproducible circularly secure bit encryption: applications and realizations (Q1698399) (← links)
- Master-key KDM-secure ABE via predicate encoding (Q2061934) (← links)
- On black-box extension of a non-interactive zero-knowledge proof system for secret equality (Q2152072) (← links)
- CPA-to-CCA transformation for KDM security (Q2175934) (← links)
- Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions (Q2210433) (← links)
- KDM security for identity-based encryption: constructions and separations (Q2215124) (← links)
- Efficient fully structure-preserving signatures and shrinking commitments (Q2318093) (← links)
- Naor-Yung paradigm with shared randomness and applications (Q2401764) (← links)
- QANIZK for adversary-dependent languages and their applications (Q2420581) (← links)
- Non-interactive composition of sigma-protocols via Share-then-Hash (Q2691604) (← links)
- Completeness of Single-Bit Projection-KDM Security for Public Key Encryption (Q2790040) (← links)
- Naor-Yung Paradigm with Shared Randomness and Applications (Q2827710) (← links)
- Memory Erasability Amplification (Q2827713) (← links)
- Bounded KDM Security from iO and OWF (Q2827740) (← links)
- Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions (Q2953781) (← links)
- Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks (Q2975822) (← links)
- Non-interactive Confirmer Signatures (Q3073694) (← links)
- Key-Dependent Message Security for Division Function: Discouraging Anonymous Credential Sharing (Q3092366) (← links)
- Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes (Q3104713) (← links)
- On Symmetric Encryption and Point Obfuscation (Q3408187) (← links)
- Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions (Q3457071) (← links)
- A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks (Q3627444) (← links)
- Tagged One-Time Signatures: Tight Security and Optimal Tag Size (Q4916017) (← links)
- Efficient Confirmer Signatures from the “Signature of a Commitment” Paradigm (Q4933213) (← links)
- Master-Key KDM-Secure IBE from Pairings (Q5041155) (← links)
- On Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation Soundness (Q5041170) (← links)
- The KDM-CCA Security of REACT (Q5056009) (← links)
- Improved Structure Preserving Signatures Under Standard Bilinear Assumptions (Q5738756) (← links)
- Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts (Q5738790) (← links)
- Generic constructions of master-key KDM secure attribute-based encryption (Q6146591) (← links)