Incremental symmetric puncturable encryption with support for unbounded number of punctures
From MaRDI portal
Publication:2697484
DOI10.1007/S10623-022-01143-YOpenAlexW4310081583WikidataQ121141491 ScholiaQ121141491MaRDI QIDQ2697484FDOQ2697484
Authors: Shi-Feng Sun, Ron Steinfeld, Amin Sakzad
Publication date: 12 April 2023
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-022-01143-y
Recommendations
- Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption
- Puncturable Identity-Based Encryption from Lattices
- Public-key puncturable encryption: modular and compact constructions
- Private puncturable PRFs from standard lattice assumptions
- Puncturable key wrapping and its applications
Cites Work
- Title not available (Why is that?)
- Identity-Based Encryption from the Weil Pairing
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Worst‐Case to Average‐Case Reductions Based on Gaussian Measures
- Multiparty computation with low communication, computation and interaction via threshold FHE
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Constrained pseudorandom functions and their applications
- Key homomorphic PRFs and their applications
- Chosen-Ciphertext Secure Fully Homomorphic Encryption
- Revisiting proxy re-encryption: forward secrecy, improved security, and applications
- 0-RTT key exchange with full forward secrecy
- Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
- Constrained key-homomorphic PRFs from standard lattice assumptions. Or: how to secretly embed a circuit in your PRF
- Adaptively secure puncturable pseudorandom functions in the standard model
- Watermarking cryptographic capabilities
- Key-homomorphic constrained pseudorandom functions
- CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors
- Public-key puncturable encryption: modular and compact constructions
- Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption
- Puncturable Identity-Based Encryption from Lattices
- Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
Cited In (5)
- Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption
- Public-key puncturable encryption: modular and compact constructions
- Fine-grained forward secrecy: allow-list/deny-list encryption and applications
- Puncturable signature: a generic construction and instantiations
- Puncturable key wrapping and its applications
This page was built for publication: Incremental symmetric puncturable encryption with support for unbounded number of punctures
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2697484)