Instantiating Random Oracles via UCEs
From MaRDI portal
Publication:2849409
DOI10.1007/978-3-642-40084-1_23zbMath1316.94060OpenAlexW177462532MaRDI QIDQ2849409
Sriram Keelveedhi, Viet Tung Hoang, Mihir Bellare
Publication date: 17 September 2013
Published in: Advances in Cryptology – CRYPTO 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-40084-1_23
Related Items (36)
Practical algorithm substitution attack on extractable signatures ⋮ Toward RSA-OAEP Without Random Oracles ⋮ Limits on the adaptive security of Yao's garbling ⋮ Adaptive Security of Yao’s Garbled Circuits ⋮ Approximate-Deterministic Public Key Encryption from Hard Learning Problems ⋮ Adaptive security of practical garbling schemes ⋮ Fiat-Shamir and correlation intractability from strong KDM-secure encryption ⋮ Another step towards realizing random oracles: non-malleable point obfuscation ⋮ Towards Forward Security Properties for PEKS and IBE ⋮ Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings ⋮ Instantiability of RSA-OAEP under chosen-plaintext attack ⋮ The random oracle model: a twenty-year retrospective ⋮ Flexible password-based encryption: securing cloud storage and provably resisting partitioning-oracle attacks ⋮ Structure-preserving compilers from new notions of obfuscations ⋮ Selective-Opening Security in the Presence of Randomness Failures ⋮ How to Generate and Use Universal Samplers ⋮ Efficient leakage-resilient MACs without idealized assumptions ⋮ Augmented random oracles ⋮ Beyond Uber: instantiating generic groups via PGGs ⋮ Instantiability of classical random-oracle-model encryption transforms ⋮ On treewidth, separators and Yao's garbling ⋮ Lossy Key Encapsulation Mechanism and Its Applications ⋮ Modeling Random Oracles Under Unpredictable Queries ⋮ Subversion-resilient signatures: definitions, constructions and applications ⋮ Public-Seed Pseudorandom Permutations ⋮ On the Correlation Intractability of Obfuscated Pseudorandom Functions ⋮ Contention in Cryptoland: Obfuscation, Leakage and UCE ⋮ Point-Function Obfuscation: A Framework and Generic Constructions ⋮ A unified approach to deterministic encryption: new constructions and a connection to computational entropy ⋮ Extracting randomness from extractor-dependent sources ⋮ Signatures Resilient to Uninvertible Leakage ⋮ A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation ⋮ Adaptively Secure Garbled Circuits from One-Way Functions ⋮ The magic of ELFs ⋮ Big-Key Symmetric Encryption: Resisting Key Exfiltration ⋮ The Magic of ELFs
This page was built for publication: Instantiating Random Oracles via UCEs