Adaptive Witness Encryption and Asymmetric Password-Based Cryptography
From MaRDI portal
Publication:2941198
Recommendations
- Witness encryption and its applications
- Offline witness encryption with semi-adaptive security
- Theory of Cryptography
- Adaptively secure threshold symmetric-key encryption
- Theory of Cryptography
- Adaptive and composable non-committing encryptions
- Improved non-committing encryption with applications to adaptively secure protocols
- Semi-adaptively secure offline witness encryption from puncturable witness PRF
Cited in
(8)- Offline witness encryption with semi-adaptive security
- Forward-secure public key encryption without key update from proof-of-stake blockchain
- How to build time-lock encryption
- Witness encryption from smooth projective hashing system
- Flexible password-based encryption: securing cloud storage and provably resisting partitioning-oracle attacks
- Offline witness encryption
- Storing and retrieving secrets on a blockchain
- Practical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofs
This page was built for publication: Adaptive Witness Encryption and Asymmetric Password-Based Cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2941198)