Selective Opening Security from Simulatable Data Encapsulation
From MaRDI portal
Publication:2953779
DOI10.1007/978-3-662-53890-6_9zbMath1407.94119OpenAlexW2557031410MaRDI QIDQ2953779
Felix Heuer, Bertram Poettering
Publication date: 6 January 2017
Published in: Advances in Cryptology – ASIACRYPT 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53890-6_9
Related Items (9)
SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions ⋮ Simulation-based selective opening security for receivers under chosen-ciphertext attacks ⋮ Selective Opening Security from Simulatable Data Encapsulation ⋮ Let attackers program ideal models: modularity and composability for adaptive compromise ⋮ Compact and tightly selective-opening secure public-key encryption schemes ⋮ Simulation-based bi-selective opening security for public key encryption ⋮ Possibility and impossibility results for receiver selective opening secure PKE in the multi-challenge setting ⋮ Receiver selective opening security for identity-based encryption in the multi-challenge setting ⋮ Practical public key encryption with selective opening security for receivers
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Standard Security Does Imply Security Against Selective Opening for Markov Distributions
- Selective Opening Security for Receivers
- Standard Security Does Not Imply Security against Selective-Opening
- On Definitions of Selective Opening Security
- Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms
- On the Selective Opening Security of Practical Public-Key Encryption Schemes
- Selective Opening Security from Simulatable Data Encapsulation
- Standard Security Does Not Imply Indistinguishability Under Selective Opening
- Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts
- Lossy trapdoor functions and their applications
- Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
- The Random Oracle Model and the Ideal Cipher Model Are Equivalent
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
- Zero Knowledge in the Random Oracle Model, Revisited
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Non-committing Encryption from Φ-hiding
- On Minimal Assumptions for Sender-Deniable Public Key Encryption
- Standard versus Selective Opening Security: Separation and Equivalence Results
- How to protect DES against exhaustive key search (an analysis of DESX).
This page was built for publication: Selective Opening Security from Simulatable Data Encapsulation