Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited
From MaRDI portal
Publication:3084349
DOI10.1007/978-3-642-19379-8_13zbMath1291.94127OpenAlexW2097885210MaRDI QIDQ3084349
Xianhui Lu, Qixiang Mei, Bao Li, Dingding Jia
Publication date: 15 March 2011
Published in: Public Key Cryptography – PKC 2011 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19379-8_13
Related Items
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications, Practical chosen ciphertext secure encryption from factoring, Lossy Identification Schemes from Decisional RSA, Strongly secure authenticated key exchange from factoring, codes, and lattices, An applications of signed quadratic residues in public key cryptography, Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli