Bounded Key-Dependent Message Security

From MaRDI portal
Publication:3563848

DOI10.1007/978-3-642-13190-5_22zbMath1280.94038OpenAlexW2101479224MaRDI QIDQ3563848

Iftach Haitner, Yuval Ishai, Dennis Hofheinz, Boaz Barak

Publication date: 1 June 2010

Published in: Advances in Cryptology – EUROCRYPT 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-13190-5_22




Related Items

Master-Key KDM-Secure IBE from PairingsThe Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iOSuccinct garbling schemes from functional encryption through a local simulation paradigmThe KDM-CCA Security of REACTReproducible Circularly-Secure Bit Encryption: Applications and RealizationsFiat-Shamir and correlation intractability from strong KDM-secure encryptionAnonymous IBE, leakage resilience and circular security from new assumptionsIndistinguishability Obfuscation for RAM Programs and Succinct Randomized EncodingsCPA-to-CCA transformation for KDM securityEfficient KDM-CCA Secure Public-Key Encryption for Polynomial FunctionsConstruction of a key-dependent message secure symmetric encryption scheme in the ideal cipher modelEncoding Functions with Constant Online Rate, or How to Compress Garbled Circuit KeysUniversal amplification of KDM security: from 1-key circular to multi-key KDMReproducible circularly secure bit encryption: applications and realizationsCircular security is complete for KDM securityUpdatable public key encryption in the standard modelKDM security for identity-based encryption: constructions and separationsFeasibility and Infeasibility of Adaptively Secure Fully Homomorphic EncryptionSeparating IND-CPA and Circular Security for Unbounded Length Key CyclesCandidate iO from homomorphic encryption schemesCompleteness of Single-Bit Projection-KDM Security for Public Key EncryptionKey-dependent message security: generic amplification and completenessOn the power of secure two-party computationCandidate iO from homomorphic encryption schemesThe Geometry of Lattice CryptographyKey-Dependent Message Security for Division Function: Discouraging Anonymous Credential SharingRate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacksBounded KDM Security from iO and OWFOn the Power of Secure Two-Party ComputationThree’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWECircular Security Separations for Arbitrary Length Cycles from LWEAdaptively Secure Garbled Circuits from One-Way FunctionsGarbled Circuits as Randomized Encodings of Functions: a PrimerSeparating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption