Towards a Separation of Semantic and CCA Security for Public Key Encryption
From MaRDI portal
Publication:3596392
DOI10.1007/978-3-540-70936-7_24zbMath1129.94021OpenAlexW1864490743MaRDI QIDQ3596392
Yael Gertner, Steven Myers, Tal Malkin
Publication date: 30 August 2007
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-70936-7_24
Related Items (21)
On Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation Soundness ⋮ Reproducible Circularly-Secure Bit Encryption: Applications and Realizations ⋮ On black-box extension of a non-interactive zero-knowledge proof system for secret equality ⋮ On the complexity of collision resistant hash functions: new and old black-box separations ⋮ CPA-to-CCA transformation for KDM security ⋮ Reconciling non-malleability with homomorphic encryption ⋮ Improved, black-box, non-malleable encryption from semantic security ⋮ On constructing one-way permutations from indistinguishability obfuscation ⋮ Reproducible circularly secure bit encryption: applications and realizations ⋮ Non-malleable encryption: simpler, shorter, stronger ⋮ Adaptive zero-knowledge proofs and adaptively secure oblivious transfer ⋮ Structure Versus Hardness Through the Obfuscation Lens ⋮ A black-box construction of non-malleable encryption from semantically secure encryption ⋮ Non-Malleable Encryption: Simpler, Shorter, Stronger ⋮ On Constructing One-Way Permutations from Indistinguishability Obfuscation ⋮ CCA security and trapdoor functions via key-dependent-message security ⋮ On the Security of Padding-Based Encryption Schemes – or – Why We Cannot Prove OAEP Secure in the Standard Model ⋮ On the Theoretical Gap between Group Signatures with and without Unlinkability ⋮ Two Is a Crowd? A Black-Box Separation of One-Wayness and Security under Correlated Inputs ⋮ Black-box use of one-way functions is useless for optimal fair coin-tossing ⋮ Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions
This page was built for publication: Towards a Separation of Semantic and CCA Security for Public Key Encryption