Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation
From MaRDI portal
Publication:2980862
DOI10.1007/978-3-319-54705-3_18zbMath1404.94083OpenAlexW2593739372MaRDI QIDQ2980862
Bao Li, Xianhui Lu, Wenpan Jing
Publication date: 5 May 2017
Published in: Information Security and Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-54705-3_18
public key encryptionindistinguishability obfuscationleakage-resiliencekey-encapsulation mechanismhash-proof system
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Leakage-Resilient Public-Key Encryption from Obfuscation
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
- Leakage Resilient ElGamal Encryption
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- Efficient Chosen-Ciphertext Security via Extractable Hash Proofs
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Identity-Based Encryption from the Weil Pairing
- Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks
- Leakage-Resilient Cryptography from Minimal Assumptions
- How to use indistinguishability obfuscation
- Advances in Cryptology - EUROCRYPT 2004
- On Extractability Obfuscation
- Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman
- Public-Key Cryptosystems Resilient to Key Leakage
This page was built for publication: Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation