Black-box circular-secure encryption beyond affine functions
From MaRDI portal
Publication:3000540
DOI10.1007/978-3-642-19571-6_13zbMATH Open1295.94028OpenAlexW1515692266MaRDI QIDQ3000540FDOQ3000540
Shafi Goldwasser, Zvika Brakerski, Yael Tauman Kalai
Publication date: 19 May 2011
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19571-6_13
Recommendations
- Bounded key-dependent message security
- Key-dependent message security: generic amplification and completeness
- Key-dependent message security: generic amplification and completeness
- Efficient circuit-size independent public key encryption with KDM security
- Circular security is complete for KDM security
Cited In (26)
- Cryptographic primitives with hinting property
- KDM security for identity-based encryption: constructions and separations
- Universal amplification of KDM security: from 1-key circular to multi-key KDM
- Bounded KDM Security from iO and OWF
- Key-Dependent Message Security for Division Function: Discouraging Anonymous Credential Sharing
- Master-Key KDM-Secure IBE from Pairings
- Fiat-Shamir and correlation intractability from strong KDM-secure encryption
- Circular Security Separations for Arbitrary Length Cycles from LWE
- Key-dependent message security: generic amplification and completeness
- Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions
- Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model
- SoK: learning with errors, circular security, and fully homomorphic encryption
- Updatable public key encryption in the standard model
- Rate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacks
- Naor-Yung paradigm with shared randomness and applications
- The KDM-CCA Security of REACT
- Reproducible circularly secure bit encryption: applications and realizations
- Completeness of Single-Bit Projection-KDM Security for Public Key Encryption
- Cryptographic primitives with hinting property
- Circular security is complete for KDM security
- Naor-Yung Paradigm with Shared Randomness and Applications
- Three’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE
- Garbled Circuits as Randomized Encodings of Functions: a Primer
- Reproducible Circularly-Secure Bit Encryption: Applications and Realizations
- Separating IND-CPA and Circular Security for Unbounded Length Key Cycles
- Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption
This page was built for publication: Black-box circular-secure encryption beyond affine functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3000540)