An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations
From MaRDI portal
Publication:3623032
DOI10.1007/978-3-642-00862-7_2zbMath1237.94077OpenAlexW1777763551MaRDI QIDQ3623032
Takahiro Matsuda, Kanta Matsuura, Goichiro Hanaoka, Hiroshi Imai
Publication date: 29 April 2009
Published in: Topics in Cryptology – CT-RSA 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-00862-7_2
Uses Software
Cites Work
- Efficient hybrid encryption from ID-based encryption
- Identity-Based Cryptosystems and Signature Schemes
- How to Generate Cryptographically Strong Sequences of Pseudorandom Bits
- Lossy trapdoor functions and their applications
- Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
- Chosen-Ciphertext Security via Correlated Products
- Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions
- Secure Hybrid Encryption from Weakened Key Encapsulation
- A Pseudorandom Generator from any One-way Function
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology – CRYPTO 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM
- Finding Collisions in the Full SHA-1
- The Twin Diffie-Hellman Problem and Applications
- On the Security of OAEP
- Topics in Cryptology – CT-RSA 2005
- Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman
- Theory of Cryptography
- Theory of Cryptography
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations