Standard Security Does Not Imply Indistinguishability Under Selective Opening
From MaRDI portal
Publication:3181024
DOI10.1007/978-3-662-53644-5_5zbMath1397.94072OpenAlexW2402377178MaRDI QIDQ3181024
Daniel Wichs, Dennis Hofheinz, Vanishree Rao
Publication date: 22 December 2016
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53644-5_5
Related Items (19)
The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO ⋮ SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions ⋮ Targeted lossy functions and applications ⋮ Receiver Selective Opening Security from Indistinguishability Obfuscation ⋮ Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts ⋮ Tightness subtleties for multi-user PKE notions ⋮ On the gold standard for security of universal steganography ⋮ Selective Opening Security from Simulatable Data Encapsulation ⋮ Selective-Opening Security in the Presence of Randomness Failures ⋮ Let attackers program ideal models: modularity and composability for adaptive compromise ⋮ Simulation-based bi-selective opening security for public key encryption ⋮ Post-quantum insecurity from LWE ⋮ Possibility and impossibility results for receiver selective opening secure PKE in the multi-challenge setting ⋮ Receiver selective opening security for identity-based encryption in the multi-challenge setting ⋮ Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks ⋮ Practical public key encryption with selective opening security for receivers ⋮ Standard Security Does Imply Security Against Selective Opening for Markov Distributions ⋮ On selective-opening security of deterministic primitives ⋮ IBE with tight security against selective opening and chosen-ciphertext attacks
Cites Work
- Unnamed Item
- Unnamed Item
- Lower bounds for non-black-box zero knowledge
- Standard Security Does Imply Security Against Selective Opening for Markov Distributions
- Selective Opening Security for Receivers
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
- Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources
- All-But-Many Lossy Trapdoor Functions
- Standard Security Does Not Imply Security against Selective-Opening
- On Definitions of Selective Opening Security
- Obfuscation ⇒ (IND-CPA Security $\not\Rightarrow$ Circular Security)
- All-But-Many Encryption
- Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security
- Magic Functions
- Lossy trapdoor functions and their applications
- Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
- A Framework for Efficient and Composable Oblivious Transfer
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited
- Separations in Circular Security for Arbitrary Length Key Cycles
- Public-Coin Differing-Inputs Obfuscation and Its Applications
- On the (im)possibility of obfuscating programs
- New Negative Results on Differing-Inputs Obfuscation
- Standard versus Selective Opening Security: Separation and Equivalence Results
This page was built for publication: Standard Security Does Not Imply Indistinguishability Under Selective Opening