Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions
From MaRDI portal
Publication:2953781
DOI10.1007/978-3-662-53890-6_11zbMath1407.94118OpenAlexW2554949581MaRDI QIDQ2953781
Shuai Han, Shengli Liu, Lin Lyu
Publication date: 6 January 2017
Published in: Advances in Cryptology – ASIACRYPT 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53890-6_11
public-key encryptionrelated-key attackauthenticated encryptionchosen-ciphertext securitykey-dependent messages
Related Items (6)
Robustly reusable fuzzy extractor with imperfect randomness ⋮ The KDM-CCA Security of REACT ⋮ Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions ⋮ On the related-key attack security of authenticated encryption schemes ⋮ The direction of updatable encryption does matter ⋮ Master-key KDM-secure ABE via predicate encoding
Cites Work
- Probabilistic encryption
- Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-Resilience
- KDM-CCA Security from RKA Secure Authenticated Encryption
- Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions
- Black-Box Circular-Secure Encryption beyond Affine Functions
- Efficient Circuit-Size Independent Public Key Encryption with KDM Security
- Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
- Bounded Key-Dependent Message Security
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- Circular-Secure Encryption from Decision Diffie-Hellman
- A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
- Circular Chosen-Ciphertext Security with Compact Ciphertexts
- Advances in Cryptology – CRYPTO 2004
- Efficient Non-interactive Proof Systems for Bilinear Groups
- On lattices, learning with errors, random linear codes, and cryptography
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions