Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman
From MaRDI portal
Publication:2293251
DOI10.1016/j.ins.2017.04.018zbMath1429.94065OpenAlexW2606494800MaRDI QIDQ2293251
Shi-Feng Sun, Robert H. Deng, Baodong Qin, Shengli Liu, Da-Wu Gu
Publication date: 7 February 2020
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2017.04.018
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Relations between robustness and RKA security under public-key encryption
- The twin Diffie-Hellman problem and applications
- Practical chosen ciphertext secure encryption from factoring
- Non-Malleable Functions and Their Applications
- RKA Secure PKE Based on the DDH and HR Assumptions
- Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier
- Public Key Encryption against Related Key Attacks
- Continuous Non-malleable Key Derivation and Its Application to Related-Key Security
- Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions
- Correlated-Input Secure Hash Functions
- Cryptography Secure against Related-Key Attacks and Tampering
- On Related-Secret Pseudorandomness
- Robust Encryption
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Lossy trapdoor functions and their applications
- Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model
- Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Practical Chosen Ciphertext Secure Encryption from Factoring
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Identity-Based Encryption from the Weil Pairing
- RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures
- Improved Constructions of PRFs Secure Against Related-Key Attacks
- Related Key Secure PKE from Hash Proof Systems
- Tamper Detection and Continuous Non-malleable Codes
- Advances in Cryptology - EUROCRYPT 2004
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Fast Software Encryption