Tight leakage-resilient CCA-security from quasi-adaptive hash proof system
From MaRDI portal
Publication:2304989
DOI10.1007/978-3-030-26951-7_15OpenAlexW2947303283MaRDI QIDQ2304989
Shuai Han, Shengli Liu, Lin Lyu, Da-Wu Gu
Publication date: 9 March 2020
Full work available at URL: https://doi.org/10.1007/978-3-030-26951-7_15
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Computer security (68M25)
Related Items (11)
Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved ⋮ Authenticated key exchange and signatures with tight security in the standard model ⋮ Almost tightly-secure re-randomizable and replayable CCA-secure public key encryption ⋮ Almost tight multi-user security under adaptive corruptions \& leakages in the standard model ⋮ Fine-grained verifier NIZK and its applications ⋮ Compact and tightly selective-opening secure public-key encryption schemes ⋮ Anonymous public key encryption under corruptions ⋮ Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness ⋮ Almost tight multi-user security under adaptive corruptions from LWE in the standard model ⋮ Unbounded HIBE with tight security ⋮ Two-pass authenticated key exchange with explicit authentication and tight security
This page was built for publication: Tight leakage-resilient CCA-security from quasi-adaptive hash proof system