Practical public key encryption with selective opening security for receivers
From MaRDI portal
Publication:2004703
DOI10.1016/J.INS.2018.10.055zbMATH Open1443.68052OpenAlexW2900006499WikidataQ120855451 ScholiaQ120855451MaRDI QIDQ2004703FDOQ2004703
Authors: Zhengan Huang, Junzuo Lai, Wenbin Chen, Liaoliang Jiang, Muhammad Raees-Ul-haq
Publication date: 7 October 2020
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2018.10.055
Recommendations
- Simulation-based selective opening security for receivers under chosen-ciphertext attacks
- Public-key encryption with selective opening security from general assumptions
- Receiver selective opening CCA secure public key encryption from various assumptions
- Selective opening security from simulatable data encapsulation
- Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions
Cites Work
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Title not available (Why is that?)
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Lattice-based linearly homomorphic signatures in the standard model
- All-but-many lossy trapdoor functions
- Title not available (Why is that?)
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
- Theory of Cryptography
- Title not available (Why is that?)
- Standard security does not imply security against selective-opening
- On definitions of selective opening security
- Identity-based encryption secure against selective opening attack
- Lossy encryption: Constructions from general assumptions and efficient selective opening chosen ciphertext security
- Encryption schemes secure against chosen-ciphertext selective opening attacks
- All-but-many lossy trapdoor functions and selective opening chosen-ciphertext security from LWE
- Tightly SIM-SO-CCA secure public key encryption from standard assumptions
- Non-malleability under selective opening attacks: implication and separation
- Selective Opening Security for Receivers
- Simulation-based selective opening CCA security for PKE from key encapsulation mechanisms
- On the selective opening security of practical public-key encryption schemes
- Selective opening security from simulatable data encapsulation
- Selective-Opening Security in the Presence of Randomness Failures
- Constructions secure against receiver selective opening and chosen ciphertext attacks
- Verifiable Computation over Large Database with Incremental Updates
- Standard security does not imply indistinguishability under selective opening
- Public-key encryption with simulation-based selective-opening security and compact ciphertexts
- Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited
- Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
- Standard versus selective opening security: separation and equivalence results
- Insight of the protection for data security under selective opening attacks
- Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
- All-but-many lossy trapdoor functions from lattices and applications
- Title not available (Why is that?)
- Privacy-preserving naive Bayes classifiers secure against the substitution-then-comparison attack
- Differentially private naive Bayes learning over multiple data sources
- Identity-Based Encryption with Outsourced Revocation in Cloud Computing
Cited In (8)
- A key-sharing based secure deduplication scheme in cloud storage
- Constant-round authenticated and dynamic group key agreement protocol for D2D group communications
- Selective Opening Security for Receivers
- Public-Key Encryption with Non-interactive Opening
- Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption
- Receiver Selective Opening Security from Indistinguishability Obfuscation
- Receiver selective opening security for identity-based encryption in the multi-challenge setting
- Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives
This page was built for publication: Practical public key encryption with selective opening security for receivers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2004703)