Lossy trapdoor functions and their applications
From MaRDI portal
Publication:3549700
Recommendations
Cited in
(only showing first 100 items - show all)- Identity-based lossy trapdoor functions: new definitions, hierarchical extensions, and implications
- Practical Chosen Ciphertext Secure Encryption from Factoring
- Extended-DDH and lossy trapdoor functions
- Strongly secure authenticated key exchange from factoring, codes, and lattices
- Efficient cryptosystems from \(2^k\)-th power residue symbols
- The Magic of ELFs
- Towards tightly secure deterministic public key encryption
- Trapdoor functions from the computational Diffie-Hellman assumption
- Shrinking the keys of discrete-log-type lossy trapdoor functions
- Better key sizes (and attacks) for LWE-based encryption
- More constructions of lossy and correlation-secure trapdoor functions
- SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions
- Programmable hash functions and their applications
- Adaptively secure distributed PRFs from \(\mathsf{LWE}\)
- Improved, black-box, non-malleable encryption from semantic security
- Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles
- Upgrading to functional encryption
- Adaptively secure distributed PRFs from LWE
- Efficient completely non-malleable and RKA secure public key encryptions
- Receiver Selective Opening Security from Indistinguishability Obfuscation
- Point-function obfuscation: a framework and generic constructions
- The geometry of lattice cryptography
- Augmented Learning with Errors: The Untapped Potential of the Error Term
- Selective opening security from simulatable data encapsulation
- Standard security does not imply indistinguishability under selective opening
- Public-key encryption with simulation-based selective-opening security and compact ciphertexts
- A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems
- On the lossiness of the Rabin trapdoor function
- Hardness of \(k\)-LWE and applications in traitor tracing
- Zero-knowledge arguments for subverted RSA groups
- Collapse-binding quantum commitments without random oracles
- Lossy Trapdoor Functions and Their Applications
- Backdoors in pseudorandom number generators: possibility and impossibility results
- A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model
- Selective-Opening Security in the Presence of Randomness Failures
- Building lossy trapdoor functions from lossy encryption
- Leakage-resilient key exchange and two-seed extractors
- Computational Security of Quantum Encryption
- On the exact round complexity of self-composable two-party computation
- Practical chosen ciphertext secure encryption from factoring
- Approximate-deterministic public key encryption from hard learning problems
- Chosen-ciphertext security from slightly lossy trapdoor functions
- Improved computational extractors and their applications
- Public-Key Cryptographic Primitives Provably as Secure as Subset Sum
- Cumulatively all-lossy-but-one trapdoor functions from standard assumptions
- Lattice-based completely non-malleable public-key encryption in the standard model
- Lattice-based key exchange on small integer solution problem
- Cryptographic functions from worst-case complexity assumptions
- A pseudorandom number generator based on worst-case lattice problems
- Deterministic Public-Key Encryption Under Continual Leakage
- Predicting Lattice Reduction
- An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption
- On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
- All-but-many encryption
- Regularly lossy functions and applications
- Optimal security proofs for full domain hash. Revisited
- Identity-based (lossy) trapdoor functions and applications
- Leakage-resilient cryptography from puncturable primitives and obfuscation
- The ECCA Security of Hybrid Encryptions
- Black-box accumulation based on lattices
- A black-box construction of non-malleable encryption from semantically secure encryption
- A counterexample to the chain rule for conditional HILL entropy
- Quantum-access-secure message authentication via blind-unforgeability
- Fine-grained cryptography revisited
- More constructions of lossy and correlation-secure trapdoor functions
- Succinct classical verification of quantum computation
- A generic construction of CCA-secure deterministic encryption
- Regular lossy functions and their applications in leakage-resilient cryptography
- Secure integration of asymmetric and symmetric encryption schemes
- Perfect structure on the edge of chaos. Trapdoor permutations from indistinguishability obfuscation
- Group homomorphic encryption: characterizations, impossibility results, and applications
- A lattice-based signcryption scheme without random oracles
- Lossy trapdoor functions from homomorphic reproducible encryption
- A unified approach to deterministic encryption: new constructions and a connection to computational entropy
- Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited
- SNARGs and PPAD hardness from the decisional Diffie-Hellman assumption
- Key encapsulation mechanisms from extractable hash proof systems, revisited
- The magic of ELFs
- Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
- Chosen ciphertext security from injective trapdoor functions
- Incompressible encodings
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification
- On selective-opening security of deterministic primitives
- Targeted lossy functions and applications
- An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations
- Toward RSA-OAEP without random oracles
- Minicrypt primitives with algebraic structure and applications
- BI-NTRU encryption schemes: two new secure variants of NTRU
- Towards tight adaptive security of non-interactive key exchange
- A framework for statistically sender private OT with optimal rate
- Non-interactive zero-knowledge from non-interactive batch arguments
- Toward non-interactive zero-knowledge proofs for NP from LWE
- Lossy cryptography from code-based assumptions
- Hintless single-server private information retrieval
- Non-interactive zero-knowledge from LPN and MQ
- Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions
- Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model
- A black-box approach to post-quantum zero-knowledge in constant rounds
- Non-malleable functions and their applications
This page was built for publication: Lossy trapdoor functions and their applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3549700)