A New Randomness Extraction Paradigm for Hybrid Encryption

From MaRDI portal
Publication:3627459

DOI10.1007/978-3-642-01001-9_34zbMath1239.94055OpenAlexW2153971105WikidataQ59163714 ScholiaQ59163714MaRDI QIDQ3627459

Martijn Stam, Krzysztof Pietrzak, Eike Kiltz, Mordechai M. Yung

Publication date: 12 May 2009

Published in: Advances in Cryptology - EUROCRYPT 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-01001-9_34




Related Items

Tight chosen ciphertext attack (CCA)-secure hybrid encryption scheme with full public verifiabilityRegular lossy functions and their applications in leakage-resilient cryptographySuper-strong RKA secure MAC, PKE and SE from tag-based hash proof systemChosen ciphertext secure keyed-homomorphic public-key cryptosystemsEfficient Code Based Hybrid and Deterministic Encryptions in the Standard ModelEfficient cryptosystems from \(2^k\)-th power residue symbolsOn the leakage-resilient key exchangePublic-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary FunctionsA new McEliece-type cryptosystem using Gabidulin-Kronecker product codesPractical chosen ciphertext secure encryption from factoringSecure integration of asymmetric and symmetric encryption schemesConstructions Secure Against Receiver Selective Opening and Chosen Ciphertext AttacksAdaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructionsNon-malleable encryption: simpler, shorter, strongerHow to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key AttacksLossy Key Encapsulation Mechanism and Its ApplicationsAn algebraic framework for Diffie-Hellman assumptionsRobust encryptionChosen Ciphertext Secure Keyed-Homomorphic Public-Key EncryptionPost-challenge leakage in public-key encryptionPractical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofsNovel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard ModelA unified approach to deterministic encryption: new constructions and a connection to computational entropyPractical Chosen Ciphertext Secure Encryption from FactoringA New Randomness Extraction Paradigm for Hybrid EncryptionTightly-secure authenticated key exchange, revisitedAdversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup ModuliA Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search ProblemsHybrid Damgård Is CCA1-Secure under the DDH AssumptionA CCA Secure Hybrid Damgård’s ElGamal Encryption



Cites Work


This page was built for publication: A New Randomness Extraction Paradigm for Hybrid Encryption