A Closer Look at Anonymity and Robustness in Encryption Schemes
From MaRDI portal
Publication:3058675
Recommendations
- Robust encryption, revisited
- On the anonymity of identity-based encryption
- Anonymity in shared symmetric key primitives
- Anamorphic encryption: private communication against a dictator
- Anonymity from Public Key Encryption to Undeniable Signatures
- Anonymous public key encryption under corruptions
- Robust authenticated encryption and the limits of symmetric cryptography
Cited in
(12)- Relations between robustness and RKA security under public-key encryption
- CASE: a new frontier in public-key authenticated encryption
- Robust encryption
- Robust encryption, revisited
- Anonymous, robust post-quantum public key encryption
- Generic constructions of integrated PKE and PEKS
- Anonymous public key encryption under corruptions
- Anonymity of NIST PQC round 3 KEMs
- A Generic Construction of Integrated Secure-Channel Free PEKS and PKE
- Group-Based Source-Destination Verifiable Encryption with Blacklist Checking
- Robust digital signature revisited
- KEMTLS with delayed forward identity protection in (almost) a single round trip
This page was built for publication: A Closer Look at Anonymity and Robustness in Encryption Schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3058675)