Robust Encryption

From MaRDI portal
Publication:3408211


DOI10.1007/978-3-642-11799-2_28zbMath1274.94032MaRDI QIDQ3408211

Gregory Neven, Mihir Bellare, Michel Abdalla

Publication date: 24 February 2010

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-11799-2_28


94A60: Cryptography


Related Items

Robust Encryption, Revisited, Short Integrated PKE+PEKS in Standard Model, Group-Based Source-Destination Verifiable Encryption with Blacklist Checking, Generic constructions of integrated PKE and PEKS, Flexible password-based encryption: securing cloud storage and provably resisting partitioning-oracle attacks, Context discovery and commitment attacks. How to break CCM, EAX, SIV, and more, Post-quantum anonymity of Kyber, On committing authenticated-encryption, IND-CCA security of Kyber in the quantum random oracle model, revisited, Anonymous authenticated communication, Multi-client functional encryption with fine-grained access control, Authenticated encryption with key identification, Anonymous public key encryption under corruptions, Robust channels: handling unreliable networks in the record layers of QUIC and DTLS 1.3, A Generic Construction of Integrated Secure-Channel Free PEKS and PKE, Relations between robustness and RKA security under public-key encryption, Robust encryption, Security under message-derived keys: signcryption in iMessage, Multi-designated receiver signed public key encryption, Efficient schemes for committing authenticated encryption, Anonymous, robust post-quantum public key encryption, Anonymity of NIST PQC round 3 KEMs, Secure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementation, Robust digital signature revisited, Anonymous HIBE with short ciphertexts: full security in prime order groups, Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman, An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users, Anonymous protocols: notions and equivalence, Contention in Cryptoland: Obfuscation, Leakage and UCE, The Simplest Protocol for Oblivious Transfer



Cites Work