Tightness subtleties for multi-user PKE notions
From MaRDI portal
Publication:2149787
DOI10.1007/978-3-030-92641-0_5zbMATH Open1492.94120OpenAlexW4205467408MaRDI QIDQ2149787FDOQ2149787
Authors: Hans Heum, Martijn Stam
Publication date: 29 June 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-92641-0_5
Recommendations
- Tightly CCA-secure encryption scheme in a multi-user setting with corruptions
- Generalized public-key cryptography with tight security
- scientific article; zbMATH DE number 5009203
- New security notions and relations for public-key encryption
- Memory-tight multi-challenge security of public-key encryption
Cites Work
- Title not available (Why is that?)
- Multi-instance security and its application to password-based cryptography
- Tightly-secure authenticated key exchange, revisited
- Theory of Cryptography
- Tightly secure signatures and public-key encryption
- Title not available (Why is that?)
- Title not available (Why is that?)
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
- Title not available (Why is that?)
- Introduction to modern cryptography
- Magic functions
- Theory of Cryptography
- Why Proving HIBE Systems Secure Is Difficult
- On the impossibility of tight cryptographic reductions
- Hybrid encryption in a multi-user setting, revisited
- Selective Opening Security for Receivers
- Tightly CCA-secure encryption without pairings
- Standard security does not imply indistinguishability under selective opening
- Tightly-secure authenticated key exchange
- A modular analysis of the Fujisaki-Okamoto transformation
- Highly efficient key exchange protocols with optimal tightness
- Notions of black-box reductions, revisited
- Analyzing multi-key security degradation
- Multi-key authenticated encryption with corruptions: reductions are lossy
- Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed?
- Everybody's a target: scalability in public-key encryption
- On tightly secure primitives in the multi-instance setting
- Tightly CCA-secure encryption scheme in a multi-user setting with corruptions
Cited In (4)
This page was built for publication: Tightness subtleties for multi-user PKE notions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2149787)