A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems
From MaRDI portal
Publication:3408192
Recommendations
- A CCA2-secure multi-decrypter encryption scheme without random oracles
- Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions
- On CCA-Secure Somewhat Homomorphic Encryption
- A generic construction of CCA-secure deterministic encryption
- Efficient fully CCA-secure predicate encryptions from pair encodings
- Achievable \textsf{CCA2} relaxation for homomorphic encryption
- Improving the efficiency of re-randomizable and replayable CCA secure public key encryption
- Structure preserving CCA secure encryption and applications
- Concise multi-challenge CCA-secure encryption and signatures with almost tight security
- CCA-secure predicate encryption from pair encoding in prime order groups: generic and efficient
Cites work
- scientific article; zbMATH DE number 176565 (Why is no real title available?)
- scientific article; zbMATH DE number 1302834 (Why is no real title available?)
- scientific article; zbMATH DE number 2086698 (Why is no real title available?)
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- A New Randomness Extraction Paradigm for Hybrid Encryption
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Chosen-Ciphertext Security via Correlated Products
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
- In search of mathematical primitives for deriving universal projective hash families
- Lossy trapdoor functions and their applications
- Nonmalleable Cryptography
- Practical Chosen Ciphertext Secure Encryption from Factoring
- Probabilistic encryption
- Pseudorandom Functions and Factoring
- Secure Hybrid Encryption from Weakened Key Encapsulation
- The Group of Signed Quadratic Residues and Applications
- The Twin Diffie-Hellman Problem and Applications
- Theory of Cryptography
Cited in
(6)- Simulation-sound arguments for LWE and applications to KDM-CCA2 security
- CCA-security from adaptive all-but-one lossy trapdoor functions
- Secure integration of asymmetric and symmetric encryption schemes
- Toward an easy-to-understand structure for achieving chosen ciphertext security from the decisional Diffie-Hellman assumption
- Practical chosen ciphertext secure encryption from factoring
- Naor-Yung paradigm with shared randomness and applications
This page was built for publication: A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3408192)