Practical public key encryption with selective opening security for receivers
From MaRDI portal
Publication:2004703
DOI10.1016/J.INS.2018.10.055zbMATH Open1443.68052OpenAlexW2900006499WikidataQ120855451 ScholiaQ120855451MaRDI QIDQ2004703FDOQ2004703
Liaoliang Jiang, Muhammad Raees-Ul-haq, Junzuo Lai, Zhengan Huang, Wenbin Chen
Publication date: 7 October 2020
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2018.10.055
Cites Work
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Title not available (Why is that?)
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Lattice-based linearly homomorphic signatures in the standard model
- All-But-Many Lossy Trapdoor Functions
- Title not available (Why is that?)
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
- Theory of Cryptography
- Title not available (Why is that?)
- Standard Security Does Not Imply Security against Selective-Opening
- On Definitions of Selective Opening Security
- Identity-Based Encryption Secure against Selective Opening Attack
- Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security
- Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
- All-but-many lossy trapdoor functions and selective opening chosen-ciphertext security from LWE
- Tightly SIM-SO-CCA secure public key encryption from standard assumptions
- Non-malleability Under Selective Opening Attacks: Implication and Separation
- Selective Opening Security for Receivers
- Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms
- On the Selective Opening Security of Practical Public-Key Encryption Schemes
- Selective Opening Security from Simulatable Data Encapsulation
- Selective-Opening Security in the Presence of Randomness Failures
- Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks
- Verifiable Computation over Large Database with Incremental Updates
- Standard Security Does Not Imply Indistinguishability Under Selective Opening
- Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts
- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited
- Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
- Standard versus Selective Opening Security: Separation and Equivalence Results
- Insight of the protection for data security under selective opening attacks
- Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
- All-but-many lossy trapdoor functions from lattices and applications
- Title not available (Why is that?)
- Privacy-preserving naive Bayes classifiers secure against the substitution-then-comparison attack
- Differentially private naive Bayes learning over multiple data sources
- Identity-Based Encryption with Outsourced Revocation in Cloud Computing
Cited In (8)
- A key-sharing based secure deduplication scheme in cloud storage
- Constant-round authenticated and dynamic group key agreement protocol for D2D group communications
- Selective Opening Security for Receivers
- Public-Key Encryption with Non-interactive Opening
- Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption
- Receiver Selective Opening Security from Indistinguishability Obfuscation
- Receiver selective opening security for identity-based encryption in the multi-challenge setting
- Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives
This page was built for publication: Practical public key encryption with selective opening security for receivers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2004703)