scientific article; zbMATH DE number 1302836

From MaRDI portal
Publication:4249318

zbMath0931.94014MaRDI QIDQ4249318

David Pointcheval, Anand Desai, Mihir Bellare, Phillip Rogaway

Publication date: 17 June 1999


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (only showing first 100 items - show all)

Non-malleable functions and their applicationsToward RSA-OAEP Without Random OraclesProtecting the privacy of voters: new definitions of ballot secrecy for e-votingA probabilistic polynomial-time process calculus for the analysis of cryptographic protocolsAn efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniableTightly secure signatures and public-key encryptionAnalysis of Gong et al.'s CCA2-secure homomorphic encryptionShort Integrated PKE+PEKS in Standard ModelSimpler CCA-Secure Public Key Encryption from Lossy Trapdoor FunctionsA note on the Dwork-Naor timed deniable authenticationTightness subtleties for multi-user PKE notionsHow to construct secure proxy cryptosystemThe wonderful world of global random oraclesSemantic Security and Key-Privacy with Random Split of St-Gen CodesIND-CCA2 secure McEliece-type modification in the standard modelSponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length MessageUsing low-density parity-check codes to improve the McEliece cryptosystemNaor-Yung paradigm with shared randomness and applicationsAnonymity of NIST PQC round 3 KEMsComposable and finite computational security of quantum message transmissionCPA-to-CCA transformation for KDM securityAn identity-based cryptographic model for discrete logarithm and integer factoring based cryptosystemOne-time encryption-key technique for the traditional DL-based encryption scheme with anonymityMulti-instance secure public-key encryptionA Brief History of Provably-Secure Public-Key EncryptionA Key Recovery Attack on MDPC with CCA Security Using Decoding ErrorsA homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracleGeneric constructions of identity-based and certificateless kEMsRelationship between Two Approaches for Defining the Standard Model PA-nessPost-quantum plaintext-awarenessGroup homomorphic encryption: characterizations, impossibility results, and applicationsShorter quasi-adaptive NIZK proofs for linear subspacesIdentity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parametersSecure integration of asymmetric and symmetric encryption schemesDiscrete logarithm based additively homomorphic encryption and secure data aggregationComputational indistinguishability between quantum states and its cryptographic applicationTightly CCA-secure encryption scheme in a multi-user setting with corruptionsJoint state composition theorems for public-key encryption and digital signature functionalities with local computationSecurity models and proof strategies for plaintext-aware encryptionLattice-based completely non-malleable public-key encryption in the standard modelCramer-Shoup Satisfies a Stronger Plaintext Awareness under a Weaker AssumptionOn the Key-Privacy Issue of McEliece Public-Key EncryptionOn Privacy Models for RFIDCryptography and cryptographic protocolsCryptographically-masked flowsA NEW HYBRID ENCRYPTION SCHEMEON THE CONSTRUCTION OF A SEMANTICALLY SECURE MODIFICATION OF THE MCELIECE CRYPTOSYSTEMCertificateless threshold cryptosystem secure against chosen-ciphertext attackSecurity Notions for Broadcast EncryptionHILA5: on reliability, reconciliation, and error correction for Ring LWE encryptionRobust encryptionOn the Semantic Security of Functional Encryption SchemesGroup rekeying in the exclusive subset-cover frameworkOn the Multi-output Filtering Model and Its ApplicationsAutomated proofs for asymmetric encryptionA note on the security of \(\text{MST} _{3}\)A computational interpretation of Dolev-Yao adversariesSome (in)sufficient conditions for secure hybrid encryptionEfficient chosen-ciphertext secure certificateless threshold key encapsulation mechanismThe Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard ModelA Provable-Security Treatment of the Key-Wrap ProblemSubtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed?Automated Proofs for Asymmetric EncryptionThe Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secureImproved efficiency of Kiltz07-KEMCompleteness of Single-Bit Projection-KDM Security for Public Key EncryptionRelations Among Notions of Plaintext AwarenessCompletely Non-malleable Encryption RevisitedSAS-Based Group Authentication and Key Agreement ProtocolsNon-malleability Under Selective Opening Attacks: Implication and SeparationTowards Key-Dependent Message Security in the Standard ModelEfficient public key encryption with smallest ciphertext expansion from factoringEfficient Completely Non-Malleable and RKA Secure Public Key EncryptionsSecurity on Hybrid Encryption with the Tag-KEM/DEM FrameworkAuthenticated encryption: relations among notions and analysis of the generic composition paradigmCo-sound Zero-Knowledge with Public KeysRevisiting (R)CCA security and replay protectionAn efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniableNaor-Yung Paradigm with Shared Randomness and ApplicationsImproving Practical UC-Secure Commitments Based on the DDH AssumptionUnforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-EncryptionTowards Security Notions for White-Box CryptographyMessage Transmission with Reverse Firewalls—Secure Communication on Corrupted MachinesDirect chosen-ciphertext secure identity-based key encapsulation without random oraclesRobust EncryptionInsight of the protection for data security under selective opening attacksSelf-certified multi-proxy signature schemes with message recoverySome Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk)Type-Based Proxy Re-encryption and Its ConstructionRound-Optimal Blind Signatures from Waters SignaturesA public key cryptosystem based on a subgroup membership problemA Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees ProtocolA Public-Key Encryption Scheme with Pseudo-random CiphertextsPrivate Information Retrieval Using Trusted HardwareSoundness of Formal Encryption in the Presence of Key-CyclesAnonymous protocols: notions and equivalenceA novel public-key encryption scheme based on Bass cyclic units in integral group ringsIND-CCA secure encryption based on a Zheng-Seberry schemeGeneric transformation from broadcast encryption to round-optimal deniable ring authenticationIdentity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting




This page was built for publication: