Selective Opening Security for Receivers
From MaRDI portal
Publication:2811142
DOI10.1007/978-3-662-48797-6_19zbMATH Open1396.94082OpenAlexW2295078047MaRDI QIDQ2811142FDOQ2811142
Authors: Carmit Hazay, Arpita Patra, Bogdan Warinschi
Publication date: 10 June 2016
Published in: Advances in Cryptology -- ASIACRYPT 2015 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-48797-6_19
Recommendations
- On definitions of selective opening security
- Receiver Selective Opening Security from Indistinguishability Obfuscation
- Practical public key encryption with selective opening security for receivers
- Selective opening security from simulatable data encapsulation
- Receiver selective opening CCA secure public key encryption from various assumptions
- Standard security does not imply security against selective-opening
- Standard versus selective opening security: separation and equivalence results
- Constructions secure against receiver selective opening and chosen ciphertext attacks
- Selective-Opening Security in the Presence of Randomness Failures
- scientific article; zbMATH DE number 2048535
Cited In (26)
- SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions
- Public-key encryption with selective opening security from general assumptions
- Practical public key encryption with selective opening security for receivers
- Virtual smart cards: how to sign with a password and a server
- Targeted lossy functions and applications
- Simulation-based selective opening security for receivers under chosen-ciphertext attacks
- Tightness subtleties for multi-user PKE notions
- Simulation-based bi-selective opening security for public key encryption
- Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions
- Anonymous public key encryption under corruptions
- Receiver Selective Opening Security from Indistinguishability Obfuscation
- SoK: public key encryption with openings
- On selective-opening security of deterministic primitives
- Insight of the protection for data security under selective opening attacks
- Standard security does not imply security against selective-opening
- On definitions of selective opening security
- Let attackers program ideal models: modularity and composability for adaptive compromise
- Possibility and impossibility results for receiver selective opening secure PKE in the multi-challenge setting
- Receiver selective opening security for identity-based encryption in the multi-challenge setting
- Standard versus selective opening security: separation and equivalence results
- On selective-opening attacks against encryption schemes
- Non-malleability under selective opening attacks: implication and separation
- Selective opening security from simulatable data encapsulation
- Standard security does not imply indistinguishability under selective opening
- Constructions secure against receiver selective opening and chosen ciphertext attacks
- Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives
This page was built for publication: Selective Opening Security for Receivers
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2811142)