Lossy Trapdoor Functions and Their Applications
From MaRDI portal
Publication:3225173
DOI10.1137/080733954zbMath1236.94063OpenAlexW2067264567MaRDI QIDQ3225173
Publication date: 15 March 2012
Published in: SIAM Journal on Computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1137/080733954
worst-case complexitychosen-ciphertext securitytrapdoor functionslossinesshardness of lattice problems
Related Items (27)
Witness Maps and Applications ⋮ Compact Lossy and All-but-One Trapdoor Functions from Lattice ⋮ Leakage Resilient One-Way Functions: The Auxiliary-Input Setting ⋮ Unbounded ABE via bilinear entropy expansion, revisited ⋮ Fully leakage-resilient signatures ⋮ On the lattice isomorphism problem, quadratic forms, remarkable lattices, and cryptography ⋮ Instantiability of RSA-OAEP under chosen-plaintext attack ⋮ Updatable all-but-one dual projective hashing and its applications ⋮ Instantiability of classical random-oracle-model encryption transforms ⋮ Reproducible circularly secure bit encryption: applications and realizations ⋮ Secure software leasing from standard assumptions ⋮ Vector and functional commitments from lattices ⋮ Non-malleable encryption: simpler, shorter, stronger ⋮ A Practical Post-Quantum Public-Key Cryptosystem Based on $$\textsf {spLWE}$$ ⋮ Lossy Key Encapsulation Mechanism and Its Applications ⋮ Incremental deterministic public-key encryption ⋮ Subversion-resilient signatures: definitions, constructions and applications ⋮ Deterministic public-key encryption for adaptively-chosen plaintext distributions ⋮ Computing boundary cycle of a pseudo-triangle polygon from its visibility graph ⋮ A multi-key SMC protocol and multi-key FHE based on some-are-errorless LWE ⋮ Leakage resilient one-way functions: the auxiliary-input setting ⋮ A unified approach to deterministic encryption: new constructions and a connection to computational entropy ⋮ Lattice-based identity-based resplittable threshold public key encryption scheme ⋮ Better security for deterministic public-key encryption: the auxiliary-input setting ⋮ CCA-security from adaptive all-but-one lossy trapdoor functions ⋮ Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited ⋮ The Complexity of Public-Key Cryptography
This page was built for publication: Lossy Trapdoor Functions and Their Applications