Lossy Key Encapsulation Mechanism and Its Applications
From MaRDI portal
Publication:2988341
DOI10.1007/978-3-319-53177-9_6zbMath1381.94079OpenAlexW2586094648MaRDI QIDQ2988341
Bao Li, Yamin Liu, Haiyang Xue, Xianhui Lu
Publication date: 19 May 2017
Published in: Information Security and Cryptology – ICISC 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-53177-9_6
Cites Work
- Unnamed Item
- Unnamed Item
- A unified approach to deterministic encryption: new constructions and a connection to computational entropy
- Instantiating Random Oracles via UCEs
- Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources
- Dual Projective Hashing and Its Applications — Lossy Trapdoor Functions and More
- Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation
- Resisting Randomness Subversion: Fast Deterministic and Hedged Public-Key Encryption in the Standard Model
- Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security
- Lossy Trapdoor Functions and Their Applications
- More Constructions of Lossy and Correlation-Secure Trapdoor Functions
- Efficient Chosen-Ciphertext Security via Extractable Hash Proofs
- On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
- Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles
- Deterministic and Efficiently Searchable Encryption
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
- A New Randomness Extraction Paradigm for Hybrid Encryption
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions
- Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
- Advances in Cryptology - EUROCRYPT 2004
- Public-Key Cryptosystems Resilient to Key Leakage
This page was built for publication: Lossy Key Encapsulation Mechanism and Its Applications