Selective Opening Security for Receivers
From MaRDI portal
Publication:2811142
DOI10.1007/978-3-662-48797-6_19zbMATH Open1396.94082OpenAlexW2295078047MaRDI QIDQ2811142FDOQ2811142
Authors: Carmit Hazay, Arpita Patra, Bogdan Warinschi
Publication date: 10 June 2016
Published in: Advances in Cryptology -- ASIACRYPT 2015 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-48797-6_19
Recommendations
- On definitions of selective opening security
- Receiver Selective Opening Security from Indistinguishability Obfuscation
- Practical public key encryption with selective opening security for receivers
- Selective opening security from simulatable data encapsulation
- Receiver selective opening CCA secure public key encryption from various assumptions
- Standard security does not imply security against selective-opening
- Standard versus selective opening security: separation and equivalence results
- Constructions secure against receiver selective opening and chosen ciphertext attacks
- Selective-Opening Security in the Presence of Randomness Failures
- scientific article; zbMATH DE number 2048535
Cited In (19)
- SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions
- Practical public key encryption with selective opening security for receivers
- Selective Opening Security from Simulatable Data Encapsulation
- Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks
- Standard Security Does Not Imply Indistinguishability Under Selective Opening
- Targeted lossy functions and applications
- Simulation-based selective opening security for receivers under chosen-ciphertext attacks
- Tightness subtleties for multi-user PKE notions
- Simulation-based bi-selective opening security for public key encryption
- Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions
- Anonymous public key encryption under corruptions
- Virtual Smart Cards: How to Sign with a Password and a Server
- Receiver Selective Opening Security from Indistinguishability Obfuscation
- SoK: public key encryption with openings
- Insight of the protection for data security under selective opening attacks
- Let attackers program ideal models: modularity and composability for adaptive compromise
- Possibility and impossibility results for receiver selective opening secure PKE in the multi-challenge setting
- Receiver selective opening security for identity-based encryption in the multi-challenge setting
- Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives
This page was built for publication: Selective Opening Security for Receivers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2811142)