Chosen ciphertext security via UCE
From MaRDI portal
Recommendations
- Instantiating random oracles via UCEs
- Using indistinguishability obfuscation via UCEs
- Indistinguishability obfuscation and UCEs: the case of computationally unpredictable sources
- Constructing and understanding chosen ciphertext security via puncturable key encapsulation mechanisms
- Modeling random oracles under unpredictable queries
Cited in
(11)- Point-function obfuscation: a framework and generic constructions
- Upgrading to functional encryption
- Chosen Ciphertext Security with Optimal Ciphertext Overhead
- Public-seed pseudorandom permutations
- Using indistinguishability obfuscation via UCEs
- Indistinguishability obfuscation and UCEs: the case of computationally unpredictable sources
- Contention in cryptoland: obfuscation, leakage and UCE
- Security definitions for hash functions: combining UCE and indifferentiability
- Instantiating random oracles via UCEs
- Cryptography from compression functions: the UCE bridge to the ROM
- Modeling random oracles under unpredictable queries
This page was built for publication: Chosen ciphertext security via UCE
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5402964)