Targeted lossy functions and applications
From MaRDI portal
Publication:2139643
DOI10.1007/978-3-030-84259-8_15zbMATH Open1489.94107OpenAlexW3184795902MaRDI QIDQ2139643FDOQ2139643
Authors: Willy Quach, Brent Waters, Daniel Wichs
Publication date: 18 May 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-84259-8_15
Recommendations
Cites Work
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Leakage-resilient cryptography from minimal assumptions
- Public-Key Cryptosystems Resilient to Key Leakage
- All-but-many lossy trapdoor functions
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
- Title not available (Why is that?)
- Lossy trapdoor functions and their applications
- On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
- Standard security does not imply security against selective-opening
- Lossy encryption: Constructions from general assumptions and efficient selective opening chosen ciphertext security
- Encryption schemes secure against chosen-ciphertext selective opening attacks
- Hedged public-key encryption: how to protect against bad randomness
- Selective Opening Security for Receivers
- Standard security does not imply indistinguishability under selective opening
- Standard versus selective opening security: separation and equivalence results
- Function secret sharing
- The Magic of ELFs
- Distributed Point Functions and Their Applications
- More constructions of lossy and correlation-secure trapdoor functions
- Fixing cracks in the concrete: random oracles with auxiliary input, revisited
- Instantiability of RSA-OAEP under chosen-plaintext attack
- Extracting randomness from extractor-dependent sources
- Low error efficient computational extractors in the CRS model
- New techniques for efficient trapdoor functions and applications
- Witness maps and applications
- Incompressible encodings
- Chosen ciphertext security from injective trapdoor functions
Cited In (11)
- Immunizing backdoored PRGs
- Searching for ELFs in the cryptographic forest
- The magic of ELFs
- Regular lossy functions and their applications in leakage-resilient cryptography
- Lossy algebraic filters with short tags
- A general framework for lattice-based ABE using evasive inner-product functional encryption
- NIZK from SNARGs
- Title not available (Why is that?)
- Cumulatively all-lossy-but-one trapdoor functions from standard assumptions
- Loss Distance Functions and Profit Function: General Duality Results
- Regularly lossy functions and applications
This page was built for publication: Targeted lossy functions and applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2139643)