Chosen ciphertext security from injective trapdoor functions
From MaRDI portal
Publication:2096512
Recommendations
Cites work
- scientific article; zbMATH DE number 176565 (Why is no real title available?)
- scientific article; zbMATH DE number 1302835 (Why is no real title available?)
- scientific article; zbMATH DE number 1302853 (Why is no real title available?)
- scientific article; zbMATH DE number 1341866 (Why is no real title available?)
- scientific article; zbMATH DE number 2086698 (Why is no real title available?)
- scientific article; zbMATH DE number 4187086 (Why is no real title available?)
- A Pseudorandom Generator from any One-way Function
- A method for obtaining digital signatures and public-key cryptosystems
- Advances in Cryptology - EUROCRYPT 2004
- Anonymous IBE, leakage resilience and circular security from new assumptions
- Basing non-interactive zero-knowledge on (enhanced) trapdoor permutations: the state of the art
- CPA-to-CCA transformation for KDM security
- Chosen-ciphertext security from slightly lossy trapdoor functions
- Chosen-ciphertext security via correlated products
- Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
- From selective IBE to full IBE and selective HIBE
- IND-CCA secure cryptography based on a variant of the LPN problem
- Identity-based encryption from the Diffie-Hellman assumption
- Introduction to modern cryptography.
- Laconic oblivious transfer and its applications
- Lossy trapdoor functions and their applications
- New constructions of identity-based and key-dependent message secure encryption schemes
- New techniques for efficient trapdoor functions and applications
- Nonmalleable Cryptography
- Practical Chosen Ciphertext Secure Encryption from Factoring
- Probabilistic encryption
- Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption
- Simple chosen-ciphertext security from low-noise LPN
- The twin Diffie-Hellman problem and applications
- Trapdoor functions from the computational Diffie-Hellman assumption
Cited in
(18)- Targeted lossy functions and applications
- Chosen-Ciphertext Security via Correlated Products
- Amortizing rate-1 OT and applications to PIR and PSI
- CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors
- Two is a crowd? A black-box separation of one-wayness and security under correlated inputs
- Security with functional re-encryption from CPA
- Adaptive trapdoor functions and chosen-ciphertext security
- How to build a trapdoor function from an encryption scheme
- Randomness recoverable secret sharing schemes
- Injective rank metric trapdoor functions with homogeneous errors
- Power of randomness recovery: tighter CCA-secure KEM in the QROM
- Preimage selective trapdoor function: how to repair an easy problem
- \textsf{FESTA}: fast encryption from supersingular torsion attacks
- Quantum CCA-secure PKE, revisited
- Cryptographic primitives with hinting property
- Chosen-ciphertext security via correlated products
- Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?
- CCA security and trapdoor functions via key-dependent-message security
This page was built for publication: Chosen ciphertext security from injective trapdoor functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2096512)