More constructions of lossy and correlation-secure trapdoor functions
From MaRDI portal
Publication:3562902
DOI10.1007/978-3-642-13013-7_17zbMATH Open1281.94024DBLPconf/pkc/FreemanGKRS10OpenAlexW2096778698WikidataQ59163709 ScholiaQ59163709MaRDI QIDQ3562902FDOQ3562902
Authors: David M. Freeman, Oded Goldreich, Eike Kiltz, Alon Rosen, Gil Segev
Publication date: 28 May 2010
Published in: Public Key Cryptography – PKC 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-13013-7_17
Recommendations
Cited In (32)
- A unified approach to deterministic encryption: new constructions and a connection to computational entropy
- Cryptographic primitives with hinting property
- Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model
- Efficient cryptosystems from \(2^k\)-th power residue symbols
- Point-function obfuscation: a framework and generic constructions
- The magic of ELFs
- Shrinking the keys of discrete-log-type lossy trapdoor functions
- Lossy trapdoor functions and their applications
- Deterministic Public-Key Encryption Under Continual Leakage
- The Rabin cryptosystem revisited
- Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage
- Lossy Key Encapsulation Mechanism and Its Applications
- Extended-DDH and lossy trapdoor functions
- How to build a trapdoor function from an encryption scheme
- More constructions of lossy and correlation-secure trapdoor functions
- Lossy trapdoor functions from homomorphic reproducible encryption
- Better security for deterministic public-key encryption: the auxiliary-input setting
- A new security notion for PKC in the standard model: weaker, simpler, and still realizing secure channels
- Correlated product security from any one-way function
- Efficient threshold encryption from lossy trapdoor functions
- SNARGs and PPAD hardness from the decisional Diffie-Hellman assumption
- Receiver Selective Opening Security from Indistinguishability Obfuscation
- The Magic of ELFs
- Compact selective opening security from LWE
- Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli
- Fully leakage-resilient signatures
- Compact Lossy and All-but-One Trapdoor Functions from Lattice
- Cryptographic primitives with hinting property
- Candidate trapdoor claw-free functions from group actions with applications to quantum protocols
- Cumulatively all-lossy-but-one trapdoor functions from standard assumptions
- Identity-based (lossy) trapdoor functions and applications
- General construction of chameleon all-but-one trapdoor functions
This page was built for publication: More constructions of lossy and correlation-secure trapdoor functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3562902)