Targeted lossy functions and applications
From MaRDI portal
Publication:2139643
DOI10.1007/978-3-030-84259-8_15zbMATH Open1489.94107OpenAlexW3184795902MaRDI QIDQ2139643FDOQ2139643
Authors: Willy Quach, Brent Waters, Daniel Wichs
Publication date: 18 May 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-84259-8_15
Recommendations
Cites Work
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Leakage-Resilient Cryptography from Minimal Assumptions
- Public-Key Cryptosystems Resilient to Key Leakage
- All-But-Many Lossy Trapdoor Functions
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
- Title not available (Why is that?)
- Lossy trapdoor functions and their applications
- On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
- Standard Security Does Not Imply Security against Selective-Opening
- Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security
- Encryption schemes secure against chosen-ciphertext selective opening attacks
- Hedged public-key encryption: how to protect against bad randomness
- Selective Opening Security for Receivers
- Standard Security Does Not Imply Indistinguishability Under Selective Opening
- Standard versus Selective Opening Security: Separation and Equivalence Results
- Function Secret Sharing
- The Magic of ELFs
- Distributed Point Functions and Their Applications
- More constructions of lossy and correlation-secure trapdoor functions
- Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input, Revisited
- Instantiability of RSA-OAEP under chosen-plaintext attack
- Extracting randomness from extractor-dependent sources
- Low error efficient computational extractors in the CRS model
- New techniques for efficient trapdoor functions and applications
- Witness Maps and Applications
- Incompressible encodings
- Chosen ciphertext security from injective trapdoor functions
Cited In (7)
- Immunizing backdoored PRGs
- Searching for ELFs in the cryptographic forest
- A general framework for lattice-based ABE using evasive inner-product functional encryption
- NIZK from SNARGs
- Title not available (Why is that?)
- Cumulatively all-lossy-but-one trapdoor functions from standard assumptions
- Loss Distance Functions and Profit Function: General Duality Results
This page was built for publication: Targeted lossy functions and applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2139643)