Bounded CCA2-Secure Encryption
From MaRDI portal
Publication:3498396
DOI10.1007/978-3-540-76900-2_31zbMath1153.94363OpenAlexW1585474545WikidataQ59163756 ScholiaQ59163756MaRDI QIDQ3498396
Vinod Vaikuntanathan, Dennis Hofheinz, Abhi Shelat, Eike Kiltz, Goichiro Hanaoka, Ronald Cramer, Rafael Pass, Hiroshi Imai
Publication date: 15 May 2008
Published in: Advances in Cryptology – ASIACRYPT 2007 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-76900-2_31
Related Items (19)
Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More ⋮ Authenticated key exchange and signatures with tight security in the standard model ⋮ Dynamic collusion bounded functional encryption from identity-based encryption ⋮ On IND-qCCA security in the ROM and its applications. CPA security is sufficient for TLS 1.3 ⋮ Optimal bounded-collusion secure functional encryption ⋮ Improved, black-box, non-malleable encryption from semantic security ⋮ Towards tight adaptive security of non-interactive key exchange ⋮ Non-malleable encryption: simpler, shorter, stronger ⋮ A black-box construction of non-malleable encryption from semantically secure encryption ⋮ Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions ⋮ Compact Proofs of Retrievability ⋮ Non-Malleable Encryption: Simpler, Shorter, Stronger ⋮ A unified approach to deterministic encryption: new constructions and a connection to computational entropy ⋮ Verifiable random functions: relations to identity-based key encapsulation and new constructions ⋮ On the Security of Padding-Based Encryption Schemes – or – Why We Cannot Prove OAEP Secure in the Standard Model ⋮ Combiners for Chosen-Ciphertext Security ⋮ Revisiting (R)CCA security and replay protection ⋮ Spooky Encryption and Its Applications ⋮ Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk)
This page was built for publication: Bounded CCA2-Secure Encryption