Tight leakage-resilient CCA-security from quasi-adaptive hash proof system
From MaRDI portal
Publication:2304989
DOI10.1007/978-3-030-26951-7_15OpenAlexW2947303283MaRDI QIDQ2304989
Shuai Han, Shengli Liu, Lin Lyu, Da-Wu Gu
Publication date: 9 March 2020
Full work available at URL: https://doi.org/10.1007/978-3-030-26951-7_15
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Computer security (68M25)
Related Items
Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved, Authenticated key exchange and signatures with tight security in the standard model, Almost tightly-secure re-randomizable and replayable CCA-secure public key encryption, Almost tight multi-user security under adaptive corruptions \& leakages in the standard model, Fine-grained verifier NIZK and its applications, Compact and tightly selective-opening secure public-key encryption schemes, Anonymous public key encryption under corruptions, Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness, Almost tight multi-user security under adaptive corruptions from LWE in the standard model, Unbounded HIBE with tight security, Two-pass authenticated key exchange with explicit authentication and tight security