scientific article; zbMATH DE number 1088228

From MaRDI portal
Publication:4364544

zbMath0882.94019MaRDI QIDQ4364544

Ran Canetti, Cynthia Dwork, Rafail Ostrovsky, Moni Naor

Publication date: 17 November 1997


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (32)

Deniable fully homomorphic encryption from learning with errorsPrivacy-preserving file sharing on cloud storage with certificateless signcryptionLimits on the Power of Indistinguishability Obfuscation and Functional EncryptionDeniable Attribute Based Encryption for Branching Programs from LWEA counterexample to the chain rule for conditional HILL entropyIncompressible cryptographyAnamorphic encryption: private communication against a dictatorA new framework for deniable secure key exchangeExplainable argumentsSelective Opening Security from Simulatable Data EncapsulationPrivately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomnessTraceable receipt-free encryptionA new approach to efficient non-malleable zero-knowledgeSubverting deniabilityOn elliptic curve $L$-functions integrated encryption schemeNo-Key Protocol for Deniable EncryptionDeniability of Symmetric Encryption Based on Computational Indistinguishability from Probabilistic CipheringDisappearing cryptography in the bounded storage modelPossibility and impossibility results for selective decommitmentsA Plausibly Deniable Encryption Scheme Utilizing PUF’s Thermo-SensitivityConstraining Pseudorandom Functions PrivatelyPrivate Puncturable PRFs from Standard Lattice AssumptionsPolling with Physical Envelopes: A Rigorous Analysis of a Human-Centric ProtocolWatermarking cryptographic functionalities from standard lattice assumptionsStandard Security Does Imply Security Against Selective Opening for Markov DistributionsDeniable searchable symmetric encryptionPossibility and Impossibility Results for Encryption and Commitment Secure under Selective OpeningOn selective-opening security of deterministic primitivesSpooky Interaction and Its Discontents: Compilers for Succinct Two-Message Argument SystemsA New Spin on Quantum Cryptography: Avoiding Trapdoors and Embracing Public KeysLeakage resilience from program obfuscationHow to Use Indistinguishability Obfuscation: Deniable Encryption, and More






This page was built for publication: