Public-key encryption with selective opening security from general assumptions
From MaRDI portal
Publication:2331983
DOI10.1007/978-3-030-14234-6_27OpenAlexW2916986180MaRDI QIDQ2331983FDOQ2331983
Authors: Dali Zhu, Renjun Zhang, Shuang Hu, Gong-Liang Chen
Publication date: 31 October 2019
Full work available at URL: https://doi.org/10.1007/978-3-030-14234-6_27
Recommendations
- Public-key encryption with simulation-based sender selective-opening security
- Simulation-based bi-selective opening security for public key encryption
- Public-key encryption with simulation-based selective-opening security and compact ciphertexts
- On selective-opening attacks against encryption schemes
- Selective Opening Security for Receivers
selective opening securitylossy encryptionexplainable hash proof systemsextractable \(\Sigma\)-protocol
Cited In (20)
- SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
- Practical public key encryption with selective opening security for receivers
- Selective-Opening Security in the Presence of Randomness Failures
- Public-key encryption with simulation-based sender selective-opening security
- Public-Key Encryption with Non-interactive Opening
- Simulation-based bi-selective opening security for public key encryption
- Compact and tightly selective-opening secure public-key encryption schemes
- Encryption schemes secure against chosen-ciphertext selective opening attacks
- Identity-based encryption secure against selective opening attack
- Lossy encryption: Constructions from general assumptions and efficient selective opening chosen ciphertext security
- Possibility and impossibility results for receiver selective opening secure PKE in the multi-challenge setting
- Receiver selective opening CCA secure public key encryption from various assumptions
- Standard Security Does Imply Security Against Selective Opening for Markov Distributions
- All-but-many lossy trapdoor functions and selective opening chosen-ciphertext security from LWE
- On selective-opening attacks against encryption schemes
- On the selective opening security of practical public-key encryption schemes
- Selective opening security from simulatable data encapsulation
- Standard security does not imply indistinguishability under selective opening
- Public-key encryption with simulation-based selective-opening security and compact ciphertexts
This page was built for publication: Public-key encryption with selective opening security from general assumptions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2331983)