All-But-Many Lossy Trapdoor Functions

From MaRDI portal
Publication:2894409

DOI10.1007/978-3-642-29011-4_14zbMath1279.94086OpenAlexW104181891MaRDI QIDQ2894409

Dennis Hofheinz

Publication date: 29 June 2012

Published in: Advances in Cryptology – EUROCRYPT 2012 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-29011-4_14




Related Items (26)

Toward RSA-OAEP Without Random OraclesSO-CCA secure PKE from pairing based all-but-many lossy trapdoor functionsTightly secure signatures and public-key encryptionTargeted lossy functions and applicationsStandard Security Does Not Imply Indistinguishability Under Selective OpeningPublic-Key Encryption with Simulation-Based Selective-Opening Security and Compact CiphertextsRegular lossy functions and their applications in leakage-resilient cryptographyEfficient chameleon hash functions in the enhanced collision resistant modelTightly CCA-secure identity-based encryption with ciphertext pseudorandomnessSimulation-based selective opening security for receivers under chosen-ciphertext attacksCumulatively all-lossy-but-one trapdoor functions from standard assumptionsCompact and tightly selective-opening secure public-key encryption schemesSimulation-based bi-selective opening security for public key encryptionPossibility and impossibility results for receiver selective opening secure PKE in the multi-challenge settingReceiver selective opening security for identity-based encryption in the multi-challenge settingExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationAll-but-many encryptionSender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks RevisitedPractical public key encryption with selective opening security for receiversNon-malleability Under Selective Opening Attacks: Implication and SeparationAlgebraic Partitioning: Fully Compact and (almost) Tightly Secure CryptographyCCA-security from adaptive all-but-one lossy trapdoor functionsSender-equivocable encryption schemes secure against chosen-ciphertext attacks revisitedDeterministic Public-Key Encryption Under Continual LeakageInsight of the protection for data security under selective opening attacksIBE with tight security against selective opening and chosen-ciphertext attacks






This page was built for publication: All-But-Many Lossy Trapdoor Functions