On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles

From MaRDI portal
Publication:3600228

DOI10.1007/978-3-540-85174-5_19zbMath1183.94024OpenAlexW2138669153MaRDI QIDQ3600228

Alexandra Boldyreva, Adam O'Neill, Serge Fehr

Publication date: 10 February 2009

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-85174-5_19




Related Items (36)

Targeted lossy functions and applicationsCompact Lossy and All-but-One Trapdoor Functions from LatticeApproximate-Deterministic Public Key Encryption from Hard Learning ProblemsA Punctured Programming Approach to Adaptively Secure Functional EncryptionRegular lossy functions and their applications in leakage-resilient cryptographyEfficient Code Based Hybrid and Deterministic Encryptions in the Standard ModelEfficient cryptosystems from \(2^k\)-th power residue symbolsInstantiability of RSA-OAEP under chosen-plaintext attackUpdatable Lossy Trapdoor Functions and Its Application in Continuous LeakageSecure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementationCumulatively all-lossy-but-one trapdoor functions from standard assumptionsHow to build a trapdoor function from an encryption schemeReproducible circularly secure bit encryption: applications and realizationsMore constructions of lossy and correlation-secure trapdoor functionsOn the impossibility of structure-preserving deterministic primitivesLossy trapdoor functions from homomorphic reproducible encryptionLossy Key Encapsulation Mechanism and Its ApplicationsTowards Tightly Secure Deterministic Public Key EncryptionEfficient public-key encryption with equality test from latticesIncremental deterministic public-key encryptionObfuscating conjunctionsDeterministic public-key encryption for adaptively-chosen plaintext distributionsA generic construction of CCA-secure deterministic encryptionOn Notions of Security for Deterministic Encryption, and Efficient Constructions without Random OraclesDeterministic Encryption: Definitional Equivalences and Constructions without Random OraclesPoint-Function Obfuscation: A Framework and Generic ConstructionsA unified approach to deterministic encryption: new constructions and a connection to computational entropyPossibility and Impossibility Results for Encryption and Commitment Secure under Selective OpeningOrder-Preserving Symmetric EncryptionBetter security for deterministic public-key encryption: the auxiliary-input settingCCA-security from adaptive all-but-one lossy trapdoor functionsDeterministic Public-Key Encryption Under Continual LeakageGeneral Construction of Chameleon All-But-One Trapdoor FunctionsAdversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup ModuliLeakage resilience from program obfuscationCiphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting




Cites Work




This page was built for publication: On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles