Robust Encryption
From MaRDI portal
Publication:3408211
DOI10.1007/978-3-642-11799-2_28zbMath1274.94032MaRDI QIDQ3408211
Gregory Neven, Mihir Bellare, Michel Abdalla
Publication date: 24 February 2010
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-11799-2_28
94A60: Cryptography
Related Items
Robust Encryption, Revisited, Short Integrated PKE+PEKS in Standard Model, Group-Based Source-Destination Verifiable Encryption with Blacklist Checking, Generic constructions of integrated PKE and PEKS, Flexible password-based encryption: securing cloud storage and provably resisting partitioning-oracle attacks, Context discovery and commitment attacks. How to break CCM, EAX, SIV, and more, Post-quantum anonymity of Kyber, On committing authenticated-encryption, IND-CCA security of Kyber in the quantum random oracle model, revisited, Anonymous authenticated communication, Multi-client functional encryption with fine-grained access control, Authenticated encryption with key identification, Anonymous public key encryption under corruptions, Robust channels: handling unreliable networks in the record layers of QUIC and DTLS 1.3, A Generic Construction of Integrated Secure-Channel Free PEKS and PKE, Relations between robustness and RKA security under public-key encryption, Robust encryption, Security under message-derived keys: signcryption in iMessage, Multi-designated receiver signed public key encryption, Efficient schemes for committing authenticated encryption, Anonymous, robust post-quantum public key encryption, Anonymity of NIST PQC round 3 KEMs, Secure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementation, Robust digital signature revisited, Anonymous HIBE with short ciphertexts: full security in prime order groups, Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman, An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users, Anonymous protocols: notions and equivalence, Contention in Cryptoland: Obfuscation, Leakage and UCE, The Simplest Protocol for Oblivious Transfer
Cites Work
- Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions
- Probabilistic encryption
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Nonmalleable Cryptography
- Identity-Based Encryption from the Weil Pairing
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Fast Software Encryption
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item