On the (Im)Possibility of Key Dependent Encryption

From MaRDI portal
Publication:3611767

DOI10.1007/978-3-642-00457-5_13zbMath1213.94105OpenAlexW1493465382MaRDI QIDQ3611767

Iftach Haitner, Thomas Holenstein

Publication date: 3 March 2009

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-00457-5_13




Related Items

The KDM-CCA Security of REACTMemory lower bounds of reductions revisitedFiat-Shamir and correlation intractability from strong KDM-secure encryptionUnprovable security of perfect NIZK and non-interactive non-malleable commitmentsOn the complexity of collision resistant hash functions: new and old black-box separationsCliptography: Clipping the Power of Kleptographic AttacksConstruction of a key-dependent message secure symmetric encryption scheme in the ideal cipher modelSecurity of message authentication codes in the presence of key-dependent messagesConstructive post-quantum reductionsLockable obfuscation from circularly insecure fully homomorphic encryptionPossibility and impossibility results for selective decommitmentsKDM security for identity-based encryption: constructions and separationsStructure Versus Hardness Through the Obfuscation LensSeparating IND-CPA and Circular Security for Unbounded Length Key CyclesClever Arbiters Versus Malicious AdversariesConstructing tree decompositions of graphs with bounded gonalityKey-dependent message security: generic amplification and completenessPossibility and Impossibility Results for Encryption and Commitment Secure under Selective OpeningA Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext AttacksOn strong simulation and composable point obfuscationKey-Dependent Message Security for Division Function: Discouraging Anonymous Credential SharingImpossibility on tamper-resilient cryptography with uniqueness propertiesBounded KDM Security from iO and OWFOn Symmetric Encryption and Point ObfuscationFinding Collisions in Interactive Protocols---Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding CommitmentsLeakage-resilient key exchange and two-seed extractorsToward Fine-Grained Blackbox Separations Between Semantic and Circular-Security NotionsHardness of LWE on general entropic distributions




This page was built for publication: On the (Im)Possibility of Key Dependent Encryption