More Constructions of Lossy and Correlation-Secure Trapdoor Functions

From MaRDI portal
Publication:3562902

DOI10.1007/978-3-642-13013-7_17zbMath1281.94024DBLPconf/pkc/FreemanGKRS10OpenAlexW2096778698WikidataQ59163709 ScholiaQ59163709MaRDI QIDQ3562902

Alon Rosen, Gil Segev, David M. Freeman, Oded Goldreich, Eike Kiltz

Publication date: 28 May 2010

Published in: Public Key Cryptography – PKC 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-13013-7_17




Related Items (23)

Compact Lossy and All-but-One Trapdoor Functions from LatticeReceiver Selective Opening Security from Indistinguishability ObfuscationFully leakage-resilient signaturesEfficient Code Based Hybrid and Deterministic Encryptions in the Standard ModelEfficient cryptosystems from \(2^k\)-th power residue symbolsSNARGs and PPAD hardness from the decisional Diffie-Hellman assumptionA new security notion for PKC in the standard model: weaker, simpler, and still realizing secure channelsCandidate trapdoor claw-free functions from group actions with applications to quantum protocolsCumulatively all-lossy-but-one trapdoor functions from standard assumptionsCryptographic primitives with hinting propertyHow to build a trapdoor function from an encryption schemeLossy trapdoor functions from homomorphic reproducible encryptionLossy Key Encapsulation Mechanism and Its ApplicationsPoint-Function Obfuscation: A Framework and Generic ConstructionsA unified approach to deterministic encryption: new constructions and a connection to computational entropyBetter security for deterministic public-key encryption: the auxiliary-input settingDeterministic Public-Key Encryption Under Continual LeakageGeneral Construction of Chameleon All-But-One Trapdoor FunctionsAdversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup ModuliEfficient Threshold Encryption from Lossy Trapdoor FunctionsThe magic of ELFsThe Magic of ELFsThe Rabin cryptosystem revisited






This page was built for publication: More Constructions of Lossy and Correlation-Secure Trapdoor Functions