Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles

From MaRDI portal
Publication:3600229

DOI10.1007/978-3-540-85174-5_20zbMath1183.94020OpenAlexW2153145614MaRDI QIDQ3600229

Thomas Ristenpart, Adam O'Neill, Mihir Bellare, Marc Fischlin

Publication date: 10 February 2009

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-85174-5_20




Related Items

Plaintext-Checkable EncryptionApproximate-Deterministic Public Key Encryption from Hard Learning ProblemsA Punctured Programming Approach to Adaptively Secure Functional EncryptionEfficient Code Based Hybrid and Deterministic Encryptions in the Standard ModelSelective-Opening Security in the Presence of Randomness FailuresSecure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementationReproducible circularly secure bit encryption: applications and realizationsOn the impossibility of structure-preserving deterministic primitivesLossy Key Encapsulation Mechanism and Its ApplicationsTowards Tightly Secure Deterministic Public Key EncryptionEfficient public-key encryption with equality test from latticesIncremental deterministic public-key encryptionSubversion-resilient signatures: definitions, constructions and applicationsDeterministic public-key encryption for adaptively-chosen plaintext distributionsFunctional Encryption: Deterministic to Randomized Functions from Simple AssumptionsA generic construction of CCA-secure deterministic encryptionOn Notions of Security for Deterministic Encryption, and Efficient Constructions without Random OraclesDeterministic Encryption: Definitional Equivalences and Constructions without Random OraclesPoint-Function Obfuscation: A Framework and Generic ConstructionsA unified approach to deterministic encryption: new constructions and a connection to computational entropyOrder-Preserving Symmetric EncryptionBetter security for deterministic public-key encryption: the auxiliary-input settingCCA-security from adaptive all-but-one lossy trapdoor functionsDeterministic Public-Key Encryption Under Continual LeakageAdversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup ModuliTwo Is a Crowd? A Black-Box Separation of One-Wayness and Security under Correlated Inputs



Cites Work


This page was built for publication: Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles