scientific article; zbMATH DE number 1951605

From MaRDI portal
Publication:4413854

zbMath1027.68594MaRDI QIDQ4413854

Thomas Shrimpton, Phillip Rogaway, John Black

Publication date: 21 July 2003

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2595/25950062.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (59)

The key-dependent message security of key-alternating Feistel ciphersMaster-Key KDM-Secure IBE from PairingsThe Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iOCounterexamples to new circular security assumptions underlying iOThe KDM-CCA Security of REACTGarbling XOR gates ``for free in the standard modelFiat-Shamir and correlation intractability from strong KDM-secure encryptionAnonymous IBE, leakage resilience and circular security from new assumptionsNaor-Yung paradigm with shared randomness and applicationsDelegating quantum computation in the quantum random oracle modelCPA-to-CCA transformation for KDM security$\mathsf{sMGM}$: parameterizable AEAD modeEfficient KDM-CCA Secure Public-Key Encryption for Polynomial FunctionsConstruction of a key-dependent message secure symmetric encryption scheme in the ideal cipher modelUnidirectional updatable encryption and proxy re-encryption from DDHKDM security for the Fujisaki-Okamoto transformations in the QROMCryptographic primitives with hinting propertyRotatable zero knowledge sets. Post compromise secure auditable dictionaries with application to key transparencyUniversal amplification of KDM security: from 1-key circular to multi-key KDMGeneric constructions of master-key KDM secure attribute-based encryptionSuccinct publicly-certifiable proofs. Or, can a blockchain verify a designated-verifier proof?On the Unprovable Security of 2-Key XCBCSecurity of message authentication codes in the presence of key-dependent messagesAugmented random oraclesBeyond Uber: instantiating generic groups via PGGsReproducible circularly secure bit encryption: applications and realizationsCircular security is complete for KDM securityThe cost of adaptivity in security games on graphsUpdatable public key encryption in the standard modelKDM security for identity-based encryption: constructions and separationsCryptographically-masked flowsModeling Random Oracles Under Unpredictable QueriesOn Cipher-Dependent Related-Key Attacks in the Ideal-Cipher ModelRobust Encryption, RevisitedSeparating IND-CPA and Circular Security for Unbounded Length Key CyclesA survey of symbolic methods in computational analysis of cryptographic systemsOAEP Is Secure under Key-Dependent MessagesCompleteness of Single-Bit Projection-KDM Security for Public Key EncryptionBlockwise-Adaptive Chosen-Plaintext Attack and Online Modes of EncryptionClever Arbiters Versus Malicious AdversariesTowards Key-Dependent Message Security in the Standard ModelIdeal Key Derivation and Encryption in Simulation-Based SecuritySecurity of signature schemes in the presence of key-dependent messagesCCA security and trapdoor functions via key-dependent-message securityKey-dependent message security: generic amplification and completenessA Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext AttacksOn strong simulation and composable point obfuscationSecurity under message-derived keys: signcryption in iMessageLarge scale, actively secure computation from LPN and free-XOR garbled circuitsKey-Dependent Message Security for Division Function: Discouraging Anonymous Credential SharingRate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacksMaster-key KDM-secure ABE via predicate encodingNaor-Yung Paradigm with Shared Randomness and ApplicationsBounded KDM Security from iO and OWFThree’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWECircular Security Separations for Arbitrary Length Cycles from LWEOn Symmetric Encryption and Point ObfuscationSoundness of Formal Encryption in the Presence of Key-CyclesGarbled Circuits as Randomized Encodings of Functions: a Primer




This page was built for publication: