Robust Encryption

From MaRDI portal
Publication:3408211

DOI10.1007/978-3-642-11799-2_28zbMath1274.94032OpenAlexW2914405671MaRDI QIDQ3408211

Gregory Neven, Mihir Bellare, Michel Abdalla

Publication date: 24 February 2010

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-11799-2_28




Related Items (30)

Relations between robustness and RKA security under public-key encryptionShort Integrated PKE+PEKS in Standard ModelGroup-Based Source-Destination Verifiable Encryption with Blacklist CheckingMulti-designated receiver signed public key encryptionEfficient schemes for committing authenticated encryptionAnonymous, robust post-quantum public key encryptionAnonymity of NIST PQC round 3 KEMsThe Simplest Protocol for Oblivious TransferFlexible password-based encryption: securing cloud storage and provably resisting partitioning-oracle attacksContext discovery and commitment attacks. How to break CCM, EAX, SIV, and morePost-quantum anonymity of KyberOn committing authenticated-encryptionIND-CCA security of Kyber in the quantum random oracle model, revisitedSecure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementationAnonymous authenticated communicationMulti-client functional encryption with fine-grained access controlAuthenticated encryption with key identificationAnonymous public key encryption under corruptionsRobust channels: handling unreliable networks in the record layers of QUIC and DTLS 1.3A Generic Construction of Integrated Secure-Channel Free PEKS and PKERobust digital signature revisitedRobust encryptionRobust Encryption, RevisitedAnonymous HIBE with short ciphertexts: full security in prime order groupsContention in Cryptoland: Obfuscation, Leakage and UCEGeneric constructions of integrated PKE and PEKSRelated-key secure key encapsulation from extended computational bilinear Diffie-HellmanSecurity under message-derived keys: signcryption in iMessageAn \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked usersAnonymous protocols: notions and equivalence



Cites Work


This page was built for publication: Robust Encryption