Anonymous, robust post-quantum public key encryption
From MaRDI portal
Publication:2170096
DOI10.1007/978-3-031-07082-2_15zbMath1502.81027OpenAlexW4285306799MaRDI QIDQ2170096
Varun Maram, Paul Grubbs, Kenneth G. Paterson
Publication date: 30 August 2022
Full work available at URL: https://doi.org/10.1007/978-3-031-07082-2_15
Quantum computation (81P68) Cryptography (94A60) Quantum coding (general) (81P70) Quantum cryptography (quantum-theoretic aspects) (81P94) Computer security (68M25)
Related Items (5)
Randomized half-ideal cipher on groups with applications to UC (a)PAKE ⋮ Post-quantum anonymity of Kyber ⋮ IND-CCA security of Kyber in the quantum random oracle model, revisited ⋮ Strongly anonymous ratcheted key exchange ⋮ Tighter QCCA-secure key encapsulation mechanism with explicit rejection in the quantum random oracle model
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- IND-CCA-secure key encapsulation mechanism in the quantum random oracle model, revisited
- Tightly-secure key-encapsulation mechanism in the quantum random oracle model
- Saber: module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM
- Fast message franking: from invisible salamanders to encryptment
- Message franking via committing authenticated encryption
- A modular analysis of the Fujisaki-Okamoto transformation
- Secure integration of asymmetric and symmetric encryption schemes
- Generic authenticated key exchange in the quantum random oracle model
- Key encapsulation mechanism with explicit rejection in the quantum random oracle model
- Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
- Secure Identity-Based Encryption in the Quantum Random Oracle Model
- A Closer Look at Anonymity and Robustness in Encryption Schemes
- Better Key Sizes (and Attacks) for LWE-Based Encryption
- Random Oracles in a Quantum World
- Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
- Robust Encryption
- Privacy in Encrypted Content Distribution Using Private Broadcast Encryption
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Robust Encryption, Revisited
- Secure and Anonymous Hybrid Encryption from Coding Theory
- Secure integration of asymmetric and symmetric encryption schemes
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity
This page was built for publication: Anonymous, robust post-quantum public key encryption