Receiver Selective Opening Security from Indistinguishability Obfuscation
From MaRDI portal
Publication:3179497
DOI10.1007/978-3-319-49890-4_22zbMath1394.94934OpenAlexW2551263122MaRDI QIDQ3179497
Xianhui Lu, Bao Li, Dingding Jia
Publication date: 21 December 2016
Published in: Progress in Cryptology – INDOCRYPT 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-49890-4_22
Related Items (6)
SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions ⋮ Anonymous public key encryption under corruptions ⋮ Simulation-based bi-selective opening security for public key encryption ⋮ Possibility and impossibility results for receiver selective opening secure PKE in the multi-challenge setting ⋮ Receiver selective opening security for identity-based encryption in the multi-challenge setting ⋮ Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Optimal-rate non-committing encryption
- Standard Security Does Imply Security Against Selective Opening for Markov Distributions
- Leakage-Resilient Public-Key Encryption from Obfuscation
- Selective Opening Security for Receivers
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Standard Security Does Not Imply Security against Selective-Opening
- On Definitions of Selective Opening Security
- On Selective-Opening Attacks against Encryption Schemes
- Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms
- On the Selective Opening Security of Practical Public-Key Encryption Schemes
- Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security
- Standard Security Does Not Imply Indistinguishability Under Selective Opening
- Lossy trapdoor functions and their applications
- More Constructions of Lossy and Correlation-Secure Trapdoor Functions
- Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions
- Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
- Efficient Chosen-Ciphertext Security via Extractable Hash Proofs
- Chosen-Ciphertext Security via Correlated Products
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
- Improved Non-committing Encryption with Applications to Adaptively Secure Protocols
- A Pseudorandom Generator from any One-way Function
- How to use indistinguishability obfuscation
- Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms
- Non-committing Encryption from Φ-hiding
- Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
- Theory of Cryptography
- Standard versus Selective Opening Security: Separation and Equivalence Results
This page was built for publication: Receiver Selective Opening Security from Indistinguishability Obfuscation