Chosen-Ciphertext Security via Correlated Products

From MaRDI portal
Publication:3611780

DOI10.1007/978-3-642-00457-5_25zbMath1213.94130OpenAlexW1590654318MaRDI QIDQ3611780

Alon Rosen, Gil Segev

Publication date: 3 March 2009

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-00457-5_25




Related Items (27)

Non-malleable functions and their applicationsSimpler CCA-Secure Public Key Encryption from Lossy Trapdoor FunctionsReceiver Selective Opening Security from Indistinguishability ObfuscationRelational Hash: Probabilistic Hash for Verifying Relations, Secure Against Forgery and MoreRegular lossy functions and their applications in leakage-resilient cryptographyEfficient Code Based Hybrid and Deterministic Encryptions in the Standard ModelA new security notion for PKC in the standard model: weaker, simpler, and still realizing secure channelsMore constructions of lossy and correlation-secure trapdoor functionsSecure integration of asymmetric and symmetric encryption schemesOn derandomizing Yao's weak-to-strong OWF constructionLeakage-resilient cryptography from puncturable primitives and obfuscationCPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPNA black-box construction of non-malleable encryption from semantically secure encryptionToward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman AssumptionSimulation-based receiver selective opening CCA secure PKE from standard computational assumptionsCCA security and trapdoor functions via key-dependent-message securityAn Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE TransformationsOn the Security of Padding-Based Encryption Schemes – or – Why We Cannot Prove OAEP Secure in the Standard ModelCCA-security from adaptive all-but-one lossy trapdoor functionsGeneral Construction of Chameleon All-But-One Trapdoor FunctionsThe magic of ELFsCryptography with Auxiliary Input and Trapdoor from Constant-Noise LPNThe Magic of ELFsA Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search ProblemsTwo Is a Crowd? A Black-Box Separation of One-Wayness and Security under Correlated InputsFinding Collisions in Interactive Protocols---Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding CommitmentsA public key cryptosystem and a signature scheme based on discrete logarithms




This page was built for publication: Chosen-Ciphertext Security via Correlated Products