scientific article

From MaRDI portal
Publication:4035737

zbMath0767.94006MaRDI QIDQ4035737

Daniel Simon, Charles W. Rackoff

Publication date: 18 May 1993


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items

Practical algorithm substitution attack on extractable signaturesGeneric Construction of Chosen Ciphertext Secure Proxy Re-EncryptionToward RSA-OAEP Without Random OraclesA practical approach to attaining chosen ciphertext securitySignature schemes secure against hard-to-invert leakageTightly secure signatures and public-key encryptionAn efficient CCA-secure cryptosystem over ideal lattices from identity-based encryptionGroup-Based Source-Destination Verifiable Encryption with Blacklist CheckingCompact Lossy and All-but-One Trapdoor Functions from LatticeA Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third PartiesSimpler CCA-Secure Public Key Encryption from Lossy Trapdoor FunctionsHow to construct secure proxy cryptosystemChosen ciphertext attacks on lattice-based public key encryption and modern (non-quantum) cryptography in a quantum environmentSponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length MessageNaor-Yung paradigm with shared randomness and applicationsCOA-secure obfuscation and applicationsMulti-designated receiver signed public key encryptionAnonymity of NIST PQC round 3 KEMsOn characterizations of escrow encryption schemesTraceable PRFs: Full Collusion Resistance and Active SecurityCPA-to-CCA transformation for KDM securityReconciling non-malleability with homomorphic encryptionInstantiability of RSA-OAEP under chosen-plaintext attackCryptographic algorithms for privacy-preserving online applicationsPractical proofs of knowledge without relying on theoretical proofs of membership on languagesStructure-Preserving Smooth Projective HashingSystematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practiceOne-time encryption-key technique for the traditional DL-based encryption scheme with anonymityFormal Security Treatments for Signatures from Identity-Based EncryptionA Brief History of Provably-Secure Public-Key EncryptionTraceable Privacy of Recent Provably-Secure RFID ProtocolsA homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracleParallel repetition of computationally sound protocols revisitedShorter quasi-adaptive NIZK proofs for linear subspacesUniversally composable symbolic security analysisPractical chosen ciphertext secure encryption from factoringSecure integration of asymmetric and symmetric encryption schemesDiscrete logarithm based additively homomorphic encryption and secure data aggregationBlack-box impossibilities of obtaining 2-round weak ZK and strong WI from polynomial hardnessTightly CCA-secure encryption scheme in a multi-user setting with corruptionsA CCA-full-anonymous group signature with verifiable controllable linkability in the standard modelAdaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructionsSecurity models and proof strategies for plaintext-aware encryptionAchieving IND-CCA Security for Functional Encryption for Inner ProductsLossy trapdoor functions from homomorphic reproducible encryptionA note on a provable secure encryption schemeAnonymous Proxy SignaturesSimplified Submission of Inputs to ProtocolsOptimistic fair exchange in the enhanced chosen-key modelA black-box construction of non-malleable encryption from semantically secure encryptionTwo-factor mutual authentication based on smart cards and passwordsRobust encryptionImproved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and ApplicationsKey Encapsulation Mechanisms from Extractable Hash Proof Systems, RevisitedTag-KEM/DEM: A new framework for hybrid encryptionOn the security of public key cryptosystems with a double decryption mechanismObfuscation for cryptographic purposesA new and improved paradigm for hybrid encryption secure against chosen-ciphertext attackToward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman AssumptionEfficient hybrid encryption from ID-based encryptionSome (in)sufficient conditions for secure hybrid encryptionSigncryption from randomness recoverable public key encryptionSubtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed?Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman AssumptionOAEP Is Secure under Key-Dependent MessagesProtecting against key-exposure: strongly key-insulated encryption with optimal thresholdThe Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secureImproved efficiency of Kiltz07-KEMNon-malleability Under Selective Opening Attacks: Implication and SeparationCCA-Secure Keyed-Fully Homomorphic EncryptionSecure ElGamal-Type Cryptosystems Without Message EncodingAn Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE TransformationsA CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard ModelEfficient public key encryption with smallest ciphertext expansion from factoringKey-dependent message security: generic amplification and completenessPractical Chosen Ciphertext Secure Encryption from FactoringA Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext AttacksOn the Security of Padding-Based Encryption Schemes – or – Why We Cannot Prove OAEP Secure in the Standard ModelA New Randomness Extraction Paradigm for Hybrid EncryptionAnonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy SignaturesBifurcated signatures: folding the accountability vs. anonymity dilemma into a single private signing schemeAuthenticated encryption: relations among notions and analysis of the generic composition paradigmOn the Theoretical Gap between Group Signatures with and without UnlinkabilityAdaptive Hardness and Composable Security in the Plain Model from Standard AssumptionsCompact E-Cash and Simulatable VRFs RevisitedNon-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairingsOn the CCA compatibility of public-key infrastructureNaor-Yung Paradigm with Shared Randomness and ApplicationsImproving Practical UC-Secure Commitments Based on the DDH AssumptionEfficient Threshold Encryption from Lossy Trapdoor FunctionsDirect chosen-ciphertext secure identity-based key encapsulation without random oraclesProvably secure Rabin-p cryptosystem in hybrid settingA Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search ProblemsRobust EncryptionInsight of the protection for data security under selective opening attacksA new cryptosystem based on a twisted Hessian curve \(H^4_{a,d}\)Security analysis and improvement of a double-trapdoor encryption schemeA public key cryptosystem based on a subgroup membership problemChosen ciphertext security from injective trapdoor functionsA performance evaluation of pairing-based broadcast encryption systemsOn the Impossibility of Strong Encryption Over $\aleph_0$Almost tightly-secure re-randomizable and replayable CCA-secure public key encryptionImplicit rejection in Fujisaki-Okamoto: framework and a novel realizationKDM security for the Fujisaki-Okamoto transformations in the QROMA new security notion for PKC in the standard model: weaker, simpler, and still realizing secure channelsIND-CCA security of Kyber in the quantum random oracle model, revisitedConcurrently composable non-interactive secure computationUniversal amplification of KDM security: from 1-key circular to multi-key KDMOn the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle modelFault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidatesOn Privacy Models for RFIDGroup EncryptionDelegation of cryptographic servers for capture-resilient devicesChasing Diagrams in CryptographyCCA-Secure Inner-Product Functional Encryption from Projective Hash FunctionsChosen-Ciphertext Secure Fully Homomorphic EncryptionStructure-Preserving Chosen-Ciphertext Security with Shorter Verifiable CiphertextsFunctional Encryption: Deterministic to Randomized Functions from Simple AssumptionsThe Geometry of Provable Security: Some Proofs of Security in Which Lattices Make a Surprise AppearanceUnidirectional Chosen-Ciphertext Secure Proxy Re-encryptionTowards Key-Dependent Message Security in the Standard ModelCCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric EncryptionCCA security and trapdoor functions via key-dependent-message securityEscrow-free encryption supporting cryptographic workflowToward a Generic Construction of Universally Convertible Undeniable Signatures from Pairing-Based SignaturesA CCA Secure Hybrid Damgård’s ElGamal EncryptionA Public-Key Encryption Scheme with Pseudo-random Ciphertexts