Tightness subtleties for multi-user PKE notions
From MaRDI portal
Publication:2149787
DOI10.1007/978-3-030-92641-0_5zbMATH Open1492.94120OpenAlexW4205467408MaRDI QIDQ2149787FDOQ2149787
Publication date: 29 June 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-92641-0_5
Recommendations
Cites Work
- Title not available (Why is that?)
- Multi-instance Security and Its Application to Password-Based Cryptography
- Tightly-secure authenticated key exchange, revisited
- Theory of Cryptography
- Tightly secure signatures and public-key encryption
- Title not available (Why is that?)
- Title not available (Why is that?)
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
- Title not available (Why is that?)
- Title not available (Why is that?)
- Magic Functions
- Theory of Cryptography
- Why Proving HIBE Systems Secure Is Difficult
- On the Impossibility of Tight Cryptographic Reductions
- Hybrid encryption in a multi-user setting, revisited
- Selective Opening Security for Receivers
- Tightly CCA-Secure Encryption Without Pairings
- Standard Security Does Not Imply Indistinguishability Under Selective Opening
- Tightly-Secure Authenticated Key Exchange
- A modular analysis of the Fujisaki-Okamoto transformation
- Highly efficient key exchange protocols with optimal tightness
- Notions of Black-Box Reductions, Revisited
- Analyzing multi-key security degradation
- Multi-key authenticated encryption with corruptions: reductions are lossy
- Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed?
- Everybody's a target: scalability in public-key encryption
- On tightly secure primitives in the multi-instance setting
- Tightly CCA-secure encryption scheme in a multi-user setting with corruptions
Cited In (3)
This page was built for publication: Tightness subtleties for multi-user PKE notions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2149787)