Efficient Chosen-Ciphertext Security via Extractable Hash Proofs
From MaRDI portal
Publication:3582762
DOI10.1007/978-3-642-14623-7_17zbMath1281.94060OpenAlexW1830579067MaRDI QIDQ3582762
Publication date: 24 August 2010
Published in: Advances in Cryptology – CRYPTO 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-14623-7_17
Related Items (18)
Practical algorithm substitution attack on extractable signatures ⋮ Non-malleable functions and their applications ⋮ New Constructions of Efficient Simulation-Sound Commitments Using Encryption and Their Applications ⋮ Receiver Selective Opening Security from Indistinguishability Obfuscation ⋮ Non-malleable commitments against quantum attacks ⋮ Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks ⋮ Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions ⋮ Practical chosen ciphertext secure encryption from factoring ⋮ Secure integration of asymmetric and symmetric encryption schemes ⋮ Leakage-resilient cryptography from puncturable primitives and obfuscation ⋮ Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions ⋮ Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation ⋮ Lossy Key Encapsulation Mechanism and Its Applications ⋮ A black-box construction of non-malleable encryption from semantically secure encryption ⋮ Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited ⋮ Predictable Arguments of Knowledge ⋮ Practical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofs ⋮ Toward Compact Public Key Encryption Based on CDH Assumption via Extended Twin DH Assumption
Uses Software
This page was built for publication: Efficient Chosen-Ciphertext Security via Extractable Hash Proofs