Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks

From MaRDI portal
Publication:3563846

DOI10.1007/978-3-642-13190-5_20zbMath1280.94052OpenAlexW1807462631WikidataQ59163704 ScholiaQ59163704MaRDI QIDQ3563846

Serge Fehr, Eike Kiltz, Dennis Hofheinz, Hoeteck Wee

Publication date: 1 June 2010

Published in: Advances in Cryptology – EUROCRYPT 2010 (Search for Journal in Brave)

Full work available at URL: https://ir.cwi.nl/pub/16830




Related Items (24)

SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functionsTargeted lossy functions and applicationsReceiver Selective Opening Security from Indistinguishability ObfuscationA Quasipolynomial Reduction for Generalized Selective Decryption on TreesStandard Security Does Not Imply Indistinguishability Under Selective OpeningPublic-Key Encryption with Simulation-Based Selective-Opening Security and Compact CiphertextsTightly CCA-secure identity-based encryption with ciphertext pseudorandomnessSimulation-based selective opening security for receivers under chosen-ciphertext attacksA generic construction of tightly secure signatures in the multi-user settingSelective Opening Security from Simulatable Data EncapsulationCompact and tightly selective-opening secure public-key encryption schemesSimulation-based bi-selective opening security for public key encryptionPossibility and impossibility results for receiver selective opening secure PKE in the multi-challenge settingReceiver selective opening security for identity-based encryption in the multi-challenge settingConstructions Secure Against Receiver Selective Opening and Chosen Ciphertext AttacksAll-but-many encryptionSender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks RevisitedPractical public key encryption with selective opening security for receiversNon-malleability Under Selective Opening Attacks: Implication and SeparationCCA security and trapdoor functions via key-dependent-message securitySender-equivocable encryption schemes secure against chosen-ciphertext attacks revisitedVirtual Smart Cards: How to Sign with a Password and a ServerInsight of the protection for data security under selective opening attacksIBE with tight security against selective opening and chosen-ciphertext attacks







This page was built for publication: Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks