A quasipolynomial reduction for generalized selective decryption on trees
From MaRDI portal
Publication:3457130
Recommendations
Cites work
- Constrained pseudorandom functions and their applications
- Corrupting One vs. Corrupting Many: The Case of Broadcast and Multicast Encryption
- Cryptographic agility and its relation to circular encryption
- Encryption schemes secure against chosen-ciphertext selective opening attacks
- Functional signatures and pseudorandom functions
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
- Tackling Adaptive Corruptions in Multicast Encryption Protocols
Cited in
(8)- The power of undirected rewindings for adaptive security
- Bounded Collusion ABE for TMs from IBE
- Adaptive security of Yao's garbled circuits
- Compact NIZKs from standard assumptions on bilinear maps
- Compact NIZKs from standard assumptions on bilinear maps
- Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin
- The cost of adaptivity in security games on graphs
- Security analysis and improvements for the IETF MLS standard for group messaging
This page was built for publication: A quasipolynomial reduction for generalized selective decryption on trees
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3457130)