Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
From MaRDI portal
Publication:3582745
DOI10.1007/978-3-642-14623-7_1zbMath1280.94042OpenAlexW1485544780MaRDI QIDQ3582745
Zvika Brakerski, Shafi Goldwasser
Publication date: 24 August 2010
Published in: Advances in Cryptology – CRYPTO 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-14623-7_1
Related Items (49)
Master-Key KDM-Secure IBE from Pairings ⋮ Almost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and More ⋮ Signature schemes secure against hard-to-invert leakage ⋮ Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation ⋮ Non-interactive batch arguments for NP from standard assumptions ⋮ The KDM-CCA Security of REACT ⋮ Fully Homomorphic Encryption with Auxiliary Inputs ⋮ Leakage-resilient cryptography from minimal assumptions ⋮ Leakage Resilient One-Way Functions: The Auxiliary-Input Setting ⋮ Reproducible Circularly-Secure Bit Encryption: Applications and Realizations ⋮ Regular lossy functions and their applications in leakage-resilient cryptography ⋮ Fiat-Shamir and correlation intractability from strong KDM-secure encryption ⋮ Anonymous IBE, leakage resilience and circular security from new assumptions ⋮ Fully leakage-resilient signatures ⋮ Naor-Yung paradigm with shared randomness and applications ⋮ Public key encryption resilient to leakage and tampering attacks ⋮ CPA-to-CCA transformation for KDM security ⋮ Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions ⋮ Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage ⋮ Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks ⋮ Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model ⋮ Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions ⋮ Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices ⋮ Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption ⋮ Lockable obfuscation from circularly insecure fully homomorphic encryption ⋮ Reproducible circularly secure bit encryption: applications and realizations ⋮ Laconic private set intersection and applications ⋮ Updatable public key encryption in the standard model ⋮ Leakage-resilient cryptography from puncturable primitives and obfuscation ⋮ KDM security for identity-based encryption: constructions and separations ⋮ Separating IND-CPA and Circular Security for Unbounded Length Key Cycles ⋮ Completeness of Single-Bit Projection-KDM Security for Public Key Encryption ⋮ Leakage resilient one-way functions: the auxiliary-input setting ⋮ Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model ⋮ CCA security and trapdoor functions via key-dependent-message security ⋮ Key-dependent message security: generic amplification and completeness ⋮ Better security for deterministic public-key encryption: the auxiliary-input setting ⋮ New constructions of statistical NIZKs: dual-mode DV-NIZKs and more ⋮ The rise of Paillier: homomorphic secret sharing and public-key silent OT ⋮ Key-Dependent Message Security for Division Function: Discouraging Anonymous Credential Sharing ⋮ Rate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacks ⋮ Naor-Yung Paradigm with Shared Randomness and Applications ⋮ Signatures Resilient to Uninvertible Leakage ⋮ Bounded KDM Security from iO and OWF ⋮ Three’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE ⋮ Circular Security Separations for Arbitrary Length Cycles from LWE ⋮ Garbled Circuits as Randomized Encodings of Functions: a Primer ⋮ Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption ⋮ Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions
This page was built for publication: Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability