scientific article; zbMATH DE number 1088228
From MaRDI portal
Publication:4364544
Recommendations
Cited in
(57)- Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack
- Leakage resilience from program obfuscation
- On limitation of plausible deniability
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
- Deniable Attribute Based Encryption for Branching Programs from LWE
- Deniable group communications in the presence of global unlimited adversary
- scientific article; zbMATH DE number 1878338 (Why is no real title available?)
- Escrow-free encryption supporting cryptographic workflow
- Subverting deniability
- Progress in Cryptology – Mycrypt 2005
- Deniable fully homomorphic encryption from learning with errors
- Watermarking cryptographic functionalities from standard lattice assumptions
- Limits on the power of indistinguishability obfuscation and functional encryption
- Constraining pseudorandom functions privately
- Private puncturable PRFs from standard lattice assumptions
- Privacy-preserving file sharing on cloud storage with certificateless signcryption
- A plausibly deniable encryption scheme utilizing PUF's thermo-sensitivity
- Practical Deniable Encryption
- Possibility and impossibility results for selective decommitments
- A new spin on quantum cryptography: avoiding trapdoors and embracing public keys
- Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol
- Explainable arguments
- Provably sender-deniable encryption scheme
- Deniable Functional Encryption
- Spooky interaction and its discontents: compilers for succinct two-message argument systems
- Decoy-based information security
- A counterexample to the chain rule for conditional HILL entropy
- Deniable-encryption protocols based on commutative ciphers
- How to use indistinguishability obfuscation
- Timed encryption with application to deniable key exchange
- On elliptic curve $L$-functions integrated encryption scheme
- Timed encryption with application to deniable key exchange
- Anamorphic encryption: private communication against a dictator
- Incompressible cryptography
- No-key protocol for deniable encryption
- Protecting distributed primitives against leakage: equivocal secret sharing and more
- Privately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomness
- Anamorphic encryption, revisited
- Anamorphic encryption: new constructions and homomorphic realizations
- On selective-opening security of deterministic primitives
- Limits of black-box anamorphic encryption
- How to use indistinguishability obfuscation: deniable encryption, and more
- scientific article; zbMATH DE number 6536413 (Why is no real title available?)
- Deniable searchable symmetric encryption
- Traceable receipt-free encryption
- Bi-deniable public-key encryption
- A new approach to efficient non-malleable zero-knowledge
- On minimal assumptions for sender-deniable public key encryption
- Deniability of symmetric encryption based on computational indistinguishability from probabilistic ciphering
- Standard Security Does Imply Security Against Selective Opening for Markov Distributions
- Deniable encryption with negligible detection probability: an interactive construction
- A new framework for deniable secure key exchange
- Lower and upper bounds for deniable public-key encryption
- Disappearing cryptography in the bounded storage model
- Selective opening security from simulatable data encapsulation
- Fully deniable interactive encryption
- Deniable cryptosystems: simpler constructions and achieving leakage resilience
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4364544)