New technique for chosen-ciphertext security based on non-interactive zero-knowledge
From MaRDI portal
Publication:2214958
DOI10.1016/J.INS.2019.03.063zbMATH Open1451.94032OpenAlexW2930759841WikidataQ122580609 ScholiaQ122580609MaRDI QIDQ2214958FDOQ2214958
Authors: Yanyan Li
Publication date: 10 December 2020
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2019.03.063
Recommendations
- scientific article; zbMATH DE number 176565
- Tightly-secure key-encapsulation mechanism in the quantum random oracle model
- Constructing and understanding chosen ciphertext security via puncturable key encapsulation mechanisms
- Advances in Cryptology - EUROCRYPT 2004
- Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles
Cites Work
- Practical Identity-Based Encryption Without Random Oracles
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- New directions in cryptography
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Title not available (Why is that?)
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles
- Efficient selective identity-based encryption without random oracles
- Nonmalleable Cryptography
- Securing threshold cryptosystems against chosen ciphertext attack
- Advances in Cryptology – CRYPTO 2004
- Secure integration of asymmetric and symmetric encryption schemes
- Efficient signature schemes with tight reductions to the Diffie-Hellman problems
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Title not available (Why is that?)
- The Twin Diffie-Hellman Problem and Applications
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles
- Title not available (Why is that?)
- Title not available (Why is that?)
- A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack
- Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT
- Tightly CCA-secure encryption without pairings
- Title not available (Why is that?)
- Identity Based Encryption Without Redundancy
- Title not available (Why is that?)
- On the hardness of proving CCA-security of Signed ElGamal
- Kurosawa-Desmedt meets tight security
- The \(k\)-BDH assumption family: bilinear map cryptography from progressively weaker assumptions
Cited In (2)
This page was built for publication: New technique for chosen-ciphertext security based on non-interactive zero-knowledge
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2214958)