Identification Schemes from Key Encapsulation Mechanisms
From MaRDI portal
Publication:3011903
DOI10.1007/978-3-642-21969-6_4zbMath1280.94103MaRDI QIDQ3011903
Publication date: 29 June 2011
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-21969-6_4
key encapsulation mechanism; identification scheme; computational Diffie-Hellman assumption; concurrent man-in-the-middle attack; one-way-CCA security
94A60: Cryptography
68P25: Data encryption (aspects in computer science)
68Q85: Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.)
94A62: Authentication, digital signatures and secret sharing
Related Items
Cites Work
- The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure
- New Constructions of Efficient Simulation-Sound Commitments Using Encryption and Their Applications
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
- The Knowledge Complexity of Interactive Proof Systems
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks
- Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology – CRYPTO 2004
- The Twin Diffie-Hellman Problem and Applications
- Theory of Cryptography
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item