Leakage-resilient IND-CCA KEM from the extractable hash proofs with indistinguishability obfuscation
From MaRDI portal
Publication:2980862
Recommendations
Cites work
- scientific article; zbMATH DE number 1302835 (Why is no real title available?)
- scientific article; zbMATH DE number 2086698 (Why is no real title available?)
- scientific article; zbMATH DE number 1842483 (Why is no real title available?)
- scientific article; zbMATH DE number 1857508 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- Advances in Cryptology - EUROCRYPT 2004
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Efficient chosen-ciphertext security via extractable hash proofs
- Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks
- How to use indistinguishability obfuscation
- Identity-Based Encryption from the Weil Pairing
- Leakage resilient ElGamal encryption
- Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Leakage-resilient cryptography from minimal assumptions
- Leakage-resilient public-key encryption from obfuscation
- On extractability obfuscation
- Public-Key Cryptosystems Resilient to Key Leakage
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
Cited in
(3)
This page was built for publication: Leakage-resilient IND-CCA KEM from the extractable hash proofs with indistinguishability obfuscation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2980862)