Robust Encryption
From MaRDI portal
Publication:3408211
DOI10.1007/978-3-642-11799-2_28zbMath1274.94032OpenAlexW2914405671MaRDI QIDQ3408211
Gregory Neven, Mihir Bellare, Michel Abdalla
Publication date: 24 February 2010
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-11799-2_28
Related Items (30)
Relations between robustness and RKA security under public-key encryption ⋮ Short Integrated PKE+PEKS in Standard Model ⋮ Group-Based Source-Destination Verifiable Encryption with Blacklist Checking ⋮ Multi-designated receiver signed public key encryption ⋮ Efficient schemes for committing authenticated encryption ⋮ Anonymous, robust post-quantum public key encryption ⋮ Anonymity of NIST PQC round 3 KEMs ⋮ The Simplest Protocol for Oblivious Transfer ⋮ Flexible password-based encryption: securing cloud storage and provably resisting partitioning-oracle attacks ⋮ Context discovery and commitment attacks. How to break CCM, EAX, SIV, and more ⋮ Post-quantum anonymity of Kyber ⋮ On committing authenticated-encryption ⋮ IND-CCA security of Kyber in the quantum random oracle model, revisited ⋮ Secure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementation ⋮ Anonymous authenticated communication ⋮ Multi-client functional encryption with fine-grained access control ⋮ Authenticated encryption with key identification ⋮ Anonymous public key encryption under corruptions ⋮ Robust channels: handling unreliable networks in the record layers of QUIC and DTLS 1.3 ⋮ A Generic Construction of Integrated Secure-Channel Free PEKS and PKE ⋮ Robust digital signature revisited ⋮ Robust encryption ⋮ Robust Encryption, Revisited ⋮ Anonymous HIBE with short ciphertexts: full security in prime order groups ⋮ Contention in Cryptoland: Obfuscation, Leakage and UCE ⋮ Generic constructions of integrated PKE and PEKS ⋮ Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman ⋮ Security under message-derived keys: signcryption in iMessage ⋮ An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users ⋮ Anonymous protocols: notions and equivalence
Cites Work
- Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
- Probabilistic encryption
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Nonmalleable Cryptography
- Identity-Based Encryption from the Weil Pairing
- Secure integration of asymmetric and symmetric encryption schemes
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Fast Software Encryption
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Robust Encryption