A New Randomness Extraction Paradigm for Hybrid Encryption
From MaRDI portal
Publication:3627459
DOI10.1007/978-3-642-01001-9_34zbMath1239.94055OpenAlexW2153971105WikidataQ59163714 ScholiaQ59163714MaRDI QIDQ3627459
Martijn Stam, Krzysztof Pietrzak, Eike Kiltz, Mordechai M. Yung
Publication date: 12 May 2009
Published in: Advances in Cryptology - EUROCRYPT 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-01001-9_34
Related Items
Tight chosen ciphertext attack (CCA)-secure hybrid encryption scheme with full public verifiability ⋮ Regular lossy functions and their applications in leakage-resilient cryptography ⋮ Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system ⋮ Chosen ciphertext secure keyed-homomorphic public-key cryptosystems ⋮ Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model ⋮ Efficient cryptosystems from \(2^k\)-th power residue symbols ⋮ On the leakage-resilient key exchange ⋮ Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions ⋮ A new McEliece-type cryptosystem using Gabidulin-Kronecker product codes ⋮ Practical chosen ciphertext secure encryption from factoring ⋮ Secure integration of asymmetric and symmetric encryption schemes ⋮ Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks ⋮ Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions ⋮ Non-malleable encryption: simpler, shorter, stronger ⋮ How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks ⋮ Lossy Key Encapsulation Mechanism and Its Applications ⋮ An algebraic framework for Diffie-Hellman assumptions ⋮ Robust encryption ⋮ Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption ⋮ Post-challenge leakage in public-key encryption ⋮ Practical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofs ⋮ Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model ⋮ A unified approach to deterministic encryption: new constructions and a connection to computational entropy ⋮ Practical Chosen Ciphertext Secure Encryption from Factoring ⋮ A New Randomness Extraction Paradigm for Hybrid Encryption ⋮ Tightly-secure authenticated key exchange, revisited ⋮ Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli ⋮ A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems ⋮ Hybrid Damgård Is CCA1-Secure under the DDH Assumption ⋮ A CCA Secure Hybrid Damgård’s ElGamal Encryption
Cites Work
- The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure
- A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Practical Chosen Ciphertext Secure Encryption from Factoring
- A New Randomness Extraction Paradigm for Hybrid Encryption
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- A Pseudorandom Generator from any One-way Function
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Nonmalleable Cryptography
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology - CRYPTO 2003
- Hybrid Damgård Is CCA1-Secure under the DDH Assumption
- A CCA Secure Hybrid Damgård’s ElGamal Encryption
- Topics in Cryptology – CT-RSA 2006
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: A New Randomness Extraction Paradigm for Hybrid Encryption