Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability

From MaRDI portal
Publication:3582745

DOI10.1007/978-3-642-14623-7_1zbMath1280.94042OpenAlexW1485544780MaRDI QIDQ3582745

Zvika Brakerski, Shafi Goldwasser

Publication date: 24 August 2010

Published in: Advances in Cryptology – CRYPTO 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-14623-7_1




Related Items (49)

Master-Key KDM-Secure IBE from PairingsAlmost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and MoreSignature schemes secure against hard-to-invert leakageMind Your Coins: Fully Leakage-Resilient Signatures with Graceful DegradationNon-interactive batch arguments for NP from standard assumptionsThe KDM-CCA Security of REACTFully Homomorphic Encryption with Auxiliary InputsLeakage-resilient cryptography from minimal assumptionsLeakage Resilient One-Way Functions: The Auxiliary-Input SettingReproducible Circularly-Secure Bit Encryption: Applications and RealizationsRegular lossy functions and their applications in leakage-resilient cryptographyFiat-Shamir and correlation intractability from strong KDM-secure encryptionAnonymous IBE, leakage resilience and circular security from new assumptionsFully leakage-resilient signaturesNaor-Yung paradigm with shared randomness and applicationsPublic key encryption resilient to leakage and tampering attacksCPA-to-CCA transformation for KDM securityEfficient KDM-CCA Secure Public-Key Encryption for Polynomial FunctionsUpdatable Lossy Trapdoor Functions and Its Application in Continuous LeakageKey continual-leakage resilient broadcast cryptosystem from dual system in broadcast networksConstruction of a key-dependent message secure symmetric encryption scheme in the ideal cipher modelStrongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard AssumptionsLeakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from latticesIdentity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear AssumptionLockable obfuscation from circularly insecure fully homomorphic encryptionReproducible circularly secure bit encryption: applications and realizationsLaconic private set intersection and applicationsUpdatable public key encryption in the standard modelLeakage-resilient cryptography from puncturable primitives and obfuscationKDM security for identity-based encryption: constructions and separationsSeparating IND-CPA and Circular Security for Unbounded Length Key CyclesCompleteness of Single-Bit Projection-KDM Security for Public Key EncryptionLeakage resilient one-way functions: the auxiliary-input settingFully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval modelCCA security and trapdoor functions via key-dependent-message securityKey-dependent message security: generic amplification and completenessBetter security for deterministic public-key encryption: the auxiliary-input settingNew constructions of statistical NIZKs: dual-mode DV-NIZKs and moreThe rise of Paillier: homomorphic secret sharing and public-key silent OTKey-Dependent Message Security for Division Function: Discouraging Anonymous Credential SharingRate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacksNaor-Yung Paradigm with Shared Randomness and ApplicationsSignatures Resilient to Uninvertible LeakageBounded KDM Security from iO and OWFThree’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWECircular Security Separations for Arbitrary Length Cycles from LWEGarbled Circuits as Randomized Encodings of Functions: a PrimerSeparating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors AssumptionToward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions




This page was built for publication: Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability