CCA2 key-privacy for code-based encryption in the standard model
From MaRDI portal
Publication:1673585
DOI10.1007/978-3-319-59879-6_3zbMATH Open1437.94078OpenAlexW2620861856MaRDI QIDQ1673585FDOQ1673585
Authors: Yusuke Yoshida, Kirill E. Morozov, Keisuke Tanaka
Publication date: 12 September 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-59879-6_3
Recommendations
- On the Key-Privacy Issue of McEliece Public-Key Encryption
- On the CCA2 security of McEliece in the standard model
- Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model
- Secure and anonymous hybrid encryption from coding theory
- An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model
Cited In (12)
- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption
- Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model
- On the CCA2 security of McEliece in the standard model
- On the Key-Privacy Issue of McEliece Public-Key Encryption
- Plaintext-checkable encryption with unlink-CCA security in the standard model
- Anonymous, robust post-quantum public key encryption
- The Boneh-Katz transformation, revisited: pseudorandom/obliviously-samplable PKE from lattices and codes and its application
- Secure and anonymous hybrid encryption from coding theory
- Semantic security and key-privacy with random split of St-Gen codes
- On IND-CCA1 security of randomized McEliece encryption in the standard model
- An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model
- CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model
This page was built for publication: CCA2 key-privacy for code-based encryption in the standard model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1673585)