Simpler CCA-secure public key encryption from lossy trapdoor functions
From MaRDI portal
Publication:3454585
DOI10.1007/978-3-319-16745-9_11zbMATH Open1400.94162OpenAlexW418564013MaRDI QIDQ3454585FDOQ3454585
Authors: Bei Liang, Rui Zhang, Hongda Li
Publication date: 25 November 2015
Published in: Information Security and Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-16745-9_11
Recommendations
- Chosen-ciphertext security from slightly lossy trapdoor functions
- Simpler CCA secure PKE from LPN problem without double-trapdoor
- CCA security and trapdoor functions via key-dependent-message security
- CCA security and trapdoor functions via key-dependent-message security
- CCA-security from adaptive all-but-one lossy trapdoor functions
Cites Work
- Probabilistic encryption
- Title not available (Why is that?)
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Title not available (Why is that?)
- Efficient Identity-Based Encryption Without Random Oracles
- Nonmalleable Cryptography
- Title not available (Why is that?)
- On-line/off-line digital signatures
- Title not available (Why is that?)
- Lossy trapdoor functions and their applications
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Topics in Cryptology – CT-RSA 2005
- On homomorphic encryption and chosen-ciphertext security
- Adaptive trapdoor functions and chosen-ciphertext security
- Efficient hybrid encryption from ID-based encryption
- A generic construction from selective-IBE to public-key encryption with non-interactive opening
- Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
- Selected Areas in Cryptography
- More constructions of lossy and correlation-secure trapdoor functions
- Chosen-Ciphertext Security via Correlated Products
- Chameleon all-but-one TDFs and their application to chosen-ciphertext security
Cited In (1)
This page was built for publication: Simpler CCA-secure public key encryption from lossy trapdoor functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3454585)