Black-Box Circular-Secure Encryption beyond Affine Functions

From MaRDI portal
Publication:3000540

DOI10.1007/978-3-642-19571-6_13zbMath1295.94028OpenAlexW1515692266MaRDI QIDQ3000540

Shafi Goldwasser, Zvika Brakerski, Yael Tauman Kalai

Publication date: 19 May 2011

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-19571-6_13




Related Items (23)

Master-Key KDM-Secure IBE from PairingsThe KDM-CCA Security of REACTReproducible Circularly-Secure Bit Encryption: Applications and RealizationsFiat-Shamir and correlation intractability from strong KDM-secure encryptionNaor-Yung paradigm with shared randomness and applicationsEfficient KDM-CCA Secure Public-Key Encryption for Polynomial FunctionsConstruction of a key-dependent message secure symmetric encryption scheme in the ideal cipher modelCryptographic primitives with hinting propertyUniversal amplification of KDM security: from 1-key circular to multi-key KDMReproducible circularly secure bit encryption: applications and realizationsUpdatable public key encryption in the standard modelKDM security for identity-based encryption: constructions and separationsSeparating IND-CPA and Circular Security for Unbounded Length Key CyclesCompleteness of Single-Bit Projection-KDM Security for Public Key EncryptionKey-dependent message security: generic amplification and completenessKey-Dependent Message Security for Division Function: Discouraging Anonymous Credential SharingRate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacksNaor-Yung Paradigm with Shared Randomness and ApplicationsBounded KDM Security from iO and OWFThree’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWECircular Security Separations for Arbitrary Length Cycles from LWEGarbled Circuits as Randomized Encodings of Functions: a PrimerSeparating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption




This page was built for publication: Black-Box Circular-Secure Encryption beyond Affine Functions