Secure Hybrid Encryption from Weakened Key Encapsulation
From MaRDI portal
Publication:3612570
DOI10.1007/978-3-540-74143-5_31zbMath1215.94051OpenAlexW2146907493WikidataQ59163762 ScholiaQ59163762MaRDI QIDQ3612570
Publication date: 10 March 2009
Published in: Advances in Cryptology - CRYPTO 2007 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-74143-5_31
Related Items (70)
Tightly secure signatures and public-key encryption ⋮ Parameter-hiding order revealing encryption ⋮ Structure-Preserving Signatures from Standard Assumptions, Revisited ⋮ Efficient Pseudorandom Functions via On-the-Fly Adaptation ⋮ An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security ⋮ Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts ⋮ Regular lossy functions and their applications in leakage-resilient cryptography ⋮ Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system ⋮ Chosen ciphertext secure keyed-homomorphic public-key cryptosystems ⋮ Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message ⋮ Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model ⋮ On the Impossibility of Strong Encryption Over $\aleph_0$ ⋮ Round-optimal password-based authenticated key exchange ⋮ Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness ⋮ A new framework for deniable secure key exchange ⋮ Fully adaptive decentralized multi-authority \textsf{ABE} ⋮ Asymmetric group message franking: definitions and constructions ⋮ \texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryption ⋮ Batch arguments for \textsf{NP} and more from standard bilinear group assumptions ⋮ Offline Assisted Group Key Exchange ⋮ The Kernel Matrix Diffie-Hellman Assumption ⋮ Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience ⋮ Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions ⋮ Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness ⋮ Group homomorphic encryption: characterizations, impossibility results, and applications ⋮ Shorter quasi-adaptive NIZK proofs for linear subspaces ⋮ More constructions of lossy and correlation-secure trapdoor functions ⋮ Practical chosen ciphertext secure encryption from factoring ⋮ Secure integration of asymmetric and symmetric encryption schemes ⋮ Scalable ciphertext compression techniques for post-quantum KEMs and their applications ⋮ Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption ⋮ Unbounded HIBE with tight security ⋮ Programmable hash functions and their applications ⋮ Statistical ZAPs from group-based assumptions ⋮ New technique for chosen-ciphertext security based on non-interactive zero-knowledge ⋮ Chosen ciphertext secure fuzzy identity based encryption without ROM ⋮ An algebraic framework for Diffie-Hellman assumptions ⋮ Tagged One-Time Signatures: Tight Security and Optimal Tag Size ⋮ Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited ⋮ Robust Encryption, Revisited ⋮ A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack ⋮ Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption ⋮ Some (in)sufficient conditions for secure hybrid encryption ⋮ Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption ⋮ Homomorphic Encryption and Signatures from Vector Decomposition ⋮ The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure ⋮ Improved efficiency of Kiltz07-KEM ⋮ Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model ⋮ The Twin Diffie-Hellman Problem and Applications ⋮ CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption ⋮ Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman ⋮ An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations ⋮ A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model ⋮ Tightly secure hierarchical identity-based encryption ⋮ Practical Chosen Ciphertext Secure Encryption from Factoring ⋮ A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks ⋮ A New Randomness Extraction Paradigm for Hybrid Encryption ⋮ CCA-security from adaptive all-but-one lossy trapdoor functions ⋮ Minicrypt primitives with algebraic structure and applications ⋮ New constructions of statistical NIZKs: dual-mode DV-NIZKs and more ⋮ Multi-recipient Public-Key Encryption from Simulators in Security Proofs ⋮ Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli ⋮ Constructing Secure Hybrid Encryption from Key Encapsulation Mechanism with Authenticity ⋮ The twin Diffie-Hellman problem and applications ⋮ A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems ⋮ IBE with tight security against selective opening and chosen-ciphertext attacks ⋮ Hybrid Damgård Is CCA1-Secure under the DDH Assumption ⋮ Shorter non-interactive zero-knowledge arguments and ZAPs for algebraic languages ⋮ Adaptive Partitioning ⋮ Secure hybrid encryption in the standard model from hard learning problems
Uses Software
This page was built for publication: Secure Hybrid Encryption from Weakened Key Encapsulation