A Closer Look at Anonymity and Robustness in Encryption Schemes
From MaRDI portal
Publication:3058675
DOI10.1007/978-3-642-17373-8_29zbMATH Open1253.94062OpenAlexW2128740045MaRDI QIDQ3058675FDOQ3058675
Authors: Payman Mohassel
Publication date: 7 December 2010
Published in: Advances in Cryptology - ASIACRYPT 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-17373-8_29
Recommendations
- Robust encryption, revisited
- On the anonymity of identity-based encryption
- Anonymity in shared symmetric key primitives
- Anamorphic encryption: private communication against a dictator
- Anonymity from Public Key Encryption to Undeniable Signatures
- Anonymous public key encryption under corruptions
- Robust authenticated encryption and the limits of symmetric cryptography
Cited In (12)
- Relations between robustness and RKA security under public-key encryption
- CASE: a new frontier in public-key authenticated encryption
- Robust encryption
- Robust encryption, revisited
- Anonymous, robust post-quantum public key encryption
- Generic constructions of integrated PKE and PEKS
- Anonymous public key encryption under corruptions
- Anonymity of NIST PQC round 3 KEMs
- A Generic Construction of Integrated Secure-Channel Free PEKS and PKE
- Group-Based Source-Destination Verifiable Encryption with Blacklist Checking
- Robust digital signature revisited
- KEMTLS with delayed forward identity protection in (almost) a single round trip
This page was built for publication: A Closer Look at Anonymity and Robustness in Encryption Schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3058675)