More Constructions of Lossy and Correlation-Secure Trapdoor Functions
From MaRDI portal
Publication:3562902
DOI10.1007/978-3-642-13013-7_17zbMath1281.94024DBLPconf/pkc/FreemanGKRS10OpenAlexW2096778698WikidataQ59163709 ScholiaQ59163709MaRDI QIDQ3562902
Alon Rosen, Gil Segev, David M. Freeman, Oded Goldreich, Eike Kiltz
Publication date: 28 May 2010
Published in: Public Key Cryptography – PKC 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-13013-7_17
Related Items (23)
Compact Lossy and All-but-One Trapdoor Functions from Lattice ⋮ Receiver Selective Opening Security from Indistinguishability Obfuscation ⋮ Fully leakage-resilient signatures ⋮ Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model ⋮ Efficient cryptosystems from \(2^k\)-th power residue symbols ⋮ SNARGs and PPAD hardness from the decisional Diffie-Hellman assumption ⋮ A new security notion for PKC in the standard model: weaker, simpler, and still realizing secure channels ⋮ Candidate trapdoor claw-free functions from group actions with applications to quantum protocols ⋮ Cumulatively all-lossy-but-one trapdoor functions from standard assumptions ⋮ Cryptographic primitives with hinting property ⋮ How to build a trapdoor function from an encryption scheme ⋮ Lossy trapdoor functions from homomorphic reproducible encryption ⋮ Lossy Key Encapsulation Mechanism and Its Applications ⋮ Point-Function Obfuscation: A Framework and Generic Constructions ⋮ A unified approach to deterministic encryption: new constructions and a connection to computational entropy ⋮ Better security for deterministic public-key encryption: the auxiliary-input setting ⋮ Deterministic Public-Key Encryption Under Continual Leakage ⋮ General Construction of Chameleon All-But-One Trapdoor Functions ⋮ Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli ⋮ Efficient Threshold Encryption from Lossy Trapdoor Functions ⋮ The magic of ELFs ⋮ The Magic of ELFs ⋮ The Rabin cryptosystem revisited
This page was built for publication: More Constructions of Lossy and Correlation-Secure Trapdoor Functions