Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions
From MaRDI portal
Publication:2946437
DOI10.1007/978-3-319-22174-8_1zbMATH Open1370.94513OpenAlexW1747263884MaRDI QIDQ2946437FDOQ2946437
Authors: Eiichiro Fujisaki, Keita Xagawa
Publication date: 17 September 2015
Published in: Progress in Cryptology -- LATINCRYPT 2015 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-22174-8_1
Recommendations
- Efficient completely non-malleable and RKA secure public key encryptions
- Efficient KDM-CCA secure public-key encryption for polynomial functions
- RKA security beyond the linear barrier: IBE, encryption and signatures
- Generalized IBE in the exponent-inversion framework
- Notions and relations for RKA-secure permutation and function families
- On the practical security of inner product functional encryption
- Efficient circuit-size independent public key encryption with KDM security
- Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance
- Efficient lattice-based inner-product functional encryption
- Information Security
Cites Work
- Public Key Encryption against Related Key Attacks
- On the joint security of encryption and signature, revisited
- Cryptography secure against related-key attacks and tampering
- Title not available (Why is that?)
- Title not available (Why is that?)
- RKA security beyond the linear barrier: IBE, encryption and signatures
- Title not available (Why is that?)
- Efficient Identity-Based Encryption Without Random Oracles
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- On the importance of eliminating errors in cryptographic computations
- Efficient selective identity-based encryption without random oracles
- Non-malleable codes
- Theory of Cryptography
- Modern computer algebra
- Pseudorandom functions and permutations provably secure against related-key attacks
- New types of cryptanalytic attacks using related keys
- Tamper and Leakage Resilience in the Split-State Model
- Non-malleable codes from additive combinatorics (extended abstract)
- Continuous non-malleable key derivation and its application to related-key security
- Correlated-input secure hash functions
- BiTR: built-in tamper resilience
- Cryptography with tamperable and leaky memory
- Tamper detection and continuous non-malleable codes
- Efficient non-malleable codes and key-derivation for poly-size tampering circuits
- Theory of Cryptography
- Advances in cryptology -- ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4--8, 2011. Proceedings
- Related-key security for pseudorandom functions beyond the linear barrier
- Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15--19, 2010. Proceedings
- RKA secure PKE based on the DDH and HR assumptions
- Related key secure PKE from hash proof systems
- Efficient chosen-ciphertext security via extractable hash proofs
- Improved constructions of PRFs secure against related-key attacks
Cited In (7)
- How to make the Cramer-Shoup cryptosystem secure against linear related-key attacks
- RKA security beyond the linear barrier: IBE, encryption and signatures
- Efficient completely non-malleable and RKA secure public key encryptions
- Impossibility on tamper-resilient cryptography with uniqueness properties
- Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman
- Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
- Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE
This page was built for publication: Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2946437)