Publication:4364544

From MaRDI portal


zbMath0882.94019MaRDI QIDQ4364544

Ran Canetti, Cynthia Dwork, Rafail Ostrovsky, Moni Naor

Publication date: 17 November 1997



94A60: Cryptography


Related Items

How to Use Indistinguishability Obfuscation: Deniable Encryption, and More, No-Key Protocol for Deniable Encryption, Deniability of Symmetric Encryption Based on Computational Indistinguishability from Probabilistic Ciphering, Constraining Pseudorandom Functions Privately, Private Puncturable PRFs from Standard Lattice Assumptions, Watermarking cryptographic functionalities from standard lattice assumptions, Explainable arguments, Privately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomness, Traceable receipt-free encryption, A new approach to efficient non-malleable zero-knowledge, Subverting deniability, On elliptic curve $L$-functions integrated encryption scheme, A counterexample to the chain rule for conditional HILL entropy, Possibility and impossibility results for selective decommitments, On selective-opening security of deterministic primitives, Deniable fully homomorphic encryption from learning with errors, Privacy-preserving file sharing on cloud storage with certificateless signcryption, Incompressible cryptography, Anamorphic encryption: private communication against a dictator, Deniable searchable symmetric encryption, Leakage resilience from program obfuscation, A new framework for deniable secure key exchange, Disappearing cryptography in the bounded storage model, Standard Security Does Imply Security Against Selective Opening for Markov Distributions, Spooky Interaction and Its Discontents: Compilers for Succinct Two-Message Argument Systems, Selective Opening Security from Simulatable Data Encapsulation, A New Spin on Quantum Cryptography: Avoiding Trapdoors and Embracing Public Keys, Limits on the Power of Indistinguishability Obfuscation and Functional Encryption, Deniable Attribute Based Encryption for Branching Programs from LWE, A Plausibly Deniable Encryption Scheme Utilizing PUF’s Thermo-Sensitivity, Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol, Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening