scientific article; zbMATH DE number 1088228
From MaRDI portal
Publication:4364544
zbMATH Open0882.94019MaRDI QIDQ4364544FDOQ4364544
Authors: Ran Canetti, Cynthia Dwork, Moni Naor, Rafail Ostrovsky
Publication date: 17 November 1997
Title of this publication is not available (Why is that?)
Recommendations
Cited In (57)
- Protecting distributed primitives against leakage: equivocal secret sharing and more
- Anamorphic encryption: new constructions and homomorphic realizations
- Limits of black-box anamorphic encryption
- Leakage resilience from program obfuscation
- On limitation of plausible deniability
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
- Deniable group communications in the presence of global unlimited adversary
- Deniable Attribute Based Encryption for Branching Programs from LWE
- Title not available (Why is that?)
- Subverting deniability
- Escrow-free encryption supporting cryptographic workflow
- Progress in Cryptology – Mycrypt 2005
- Deniable fully homomorphic encryption from learning with errors
- Watermarking cryptographic functionalities from standard lattice assumptions
- Limits on the power of indistinguishability obfuscation and functional encryption
- Constraining pseudorandom functions privately
- Private puncturable PRFs from standard lattice assumptions
- Practical Deniable Encryption
- A plausibly deniable encryption scheme utilizing PUF's thermo-sensitivity
- Privacy-preserving file sharing on cloud storage with certificateless signcryption
- A new spin on quantum cryptography: avoiding trapdoors and embracing public keys
- Possibility and impossibility results for selective decommitments
- Explainable arguments
- Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol
- Provably sender-deniable encryption scheme
- Deniable Functional Encryption
- Spooky interaction and its discontents: compilers for succinct two-message argument systems
- Decoy-based information security
- Deniable-encryption protocols based on commutative ciphers
- On elliptic curve $L$-functions integrated encryption scheme
- How to use indistinguishability obfuscation
- A counterexample to the chain rule for conditional HILL entropy
- Timed encryption with application to deniable key exchange
- No-key protocol for deniable encryption
- Timed encryption with application to deniable key exchange
- Anamorphic encryption: private communication against a dictator
- Incompressible cryptography
- Privately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomness
- Anamorphic encryption, revisited
- On selective-opening security of deterministic primitives
- How to use indistinguishability obfuscation: deniable encryption, and more
- Title not available (Why is that?)
- Deniable searchable symmetric encryption
- Traceable receipt-free encryption
- Bi-deniable public-key encryption
- A new approach to efficient non-malleable zero-knowledge
- On minimal assumptions for sender-deniable public key encryption
- Deniability of symmetric encryption based on computational indistinguishability from probabilistic ciphering
- Standard Security Does Imply Security Against Selective Opening for Markov Distributions
- Deniable encryption with negligible detection probability: an interactive construction
- Lower and upper bounds for deniable public-key encryption
- A new framework for deniable secure key exchange
- Disappearing cryptography in the bounded storage model
- Selective opening security from simulatable data encapsulation
- Deniable cryptosystems: simpler constructions and achieving leakage resilience
- Fully deniable interactive encryption
- Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4364544)