A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy

From MaRDI portal
Publication:2891507

DOI10.1007/978-3-642-28914-9_33zbMath1296.94111OpenAlexW2119718174MaRDI QIDQ2891507

Adam O'Neill, Leonid Reyzin, Benjamin Fuller

Publication date: 15 June 2012

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-28914-9_33




Related Items (20)

Toward RSA-OAEP Without Random OraclesPseudoentropy: Lower-Bounds for Chain Rules and TransformationsApproximate-Deterministic Public Key Encryption from Hard Learning ProblemsReproducible Circularly-Secure Bit Encryption: Applications and RealizationsA counterexample to the chain rule for conditional HILL entropyEfficient Code Based Hybrid and Deterministic Encryptions in the Standard ModelThe Chain Rule for HILL Pseudoentropy, RevisitedMetric Pseudoentropy: Characterizations, Transformations and ApplicationsNonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to PseudoentropyA Better Chain Rule for HILL Pseudoentropy - Beyond Bounded LeakageSecure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementationInstantiability of classical random-oracle-model encryption transformsIncremental deterministic public-key encryptionDeterministic public-key encryption for adaptively-chosen plaintext distributionsFunctional Encryption: Deterministic to Randomized Functions from Simple AssumptionsA generic construction of CCA-secure deterministic encryptionA unified approach to deterministic encryption: new constructions and a connection to computational entropyBetter security for deterministic public-key encryption: the auxiliary-input settingDeterministic Public-Key Encryption Under Continual LeakageOn selective-opening security of deterministic primitives




This page was built for publication: A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy