Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
From MaRDI portal
Publication:3563846
DOI10.1007/978-3-642-13190-5_20zbMath1280.94052OpenAlexW1807462631WikidataQ59163704 ScholiaQ59163704MaRDI QIDQ3563846
Serge Fehr, Eike Kiltz, Dennis Hofheinz, Hoeteck Wee
Publication date: 1 June 2010
Published in: Advances in Cryptology – EUROCRYPT 2010 (Search for Journal in Brave)
Full work available at URL: https://ir.cwi.nl/pub/16830
Related Items (24)
SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions ⋮ Targeted lossy functions and applications ⋮ Receiver Selective Opening Security from Indistinguishability Obfuscation ⋮ A Quasipolynomial Reduction for Generalized Selective Decryption on Trees ⋮ Standard Security Does Not Imply Indistinguishability Under Selective Opening ⋮ Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts ⋮ Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness ⋮ Simulation-based selective opening security for receivers under chosen-ciphertext attacks ⋮ A generic construction of tightly secure signatures in the multi-user setting ⋮ Selective Opening Security from Simulatable Data Encapsulation ⋮ Compact and tightly selective-opening secure public-key encryption schemes ⋮ Simulation-based bi-selective opening security for public key encryption ⋮ Possibility and impossibility results for receiver selective opening secure PKE in the multi-challenge setting ⋮ Receiver selective opening security for identity-based encryption in the multi-challenge setting ⋮ Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks ⋮ All-but-many encryption ⋮ Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited ⋮ Practical public key encryption with selective opening security for receivers ⋮ Non-malleability Under Selective Opening Attacks: Implication and Separation ⋮ CCA security and trapdoor functions via key-dependent-message security ⋮ Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited ⋮ Virtual Smart Cards: How to Sign with a Password and a Server ⋮ Insight of the protection for data security under selective opening attacks ⋮ IBE with tight security against selective opening and chosen-ciphertext attacks
This page was built for publication: Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks