Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack

From MaRDI portal
Publication:4441904


DOI10.1137/S0097539702403773zbMath1045.94013WikidataQ60162890 ScholiaQ60162890MaRDI QIDQ4441904

Ronald Cramer, Victor Shoup

Publication date: 8 January 2004

Published in: SIAM Journal on Computing (Search for Journal in Brave)


94A60: Cryptography

68P25: Data encryption (aspects in computer science)


Related Items

Non-Interactive Key Exchange, Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited, Robust Encryption, Revisited, New Constructions and Applications of Trapdoor DDH Groups, On the Impossibility of Strong Encryption Over $\aleph_0$, Another look at automated theorem-proving, Faster and Shorter Password-Authenticated Key Exchange, Efficient KEMs with Partial Message Recovery, On the Connection Between Signcryption and One-Pass Key Establishment, The Twin Diffie-Hellman Problem and Applications, CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption, Hybrid Damgård Is CCA1-Secure under the DDH Assumption, Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem, A CCA Secure Hybrid Damgård’s ElGamal Encryption, Efficient non-malleable commitment schemes, Efficient non-malleable commitment schemes, Scalable public-key tracing and revoking, Two-server password-only authenticated key exchange, Possibility and impossibility results for selective decommitments, Some (in)sufficient conditions for secure hybrid encryption, Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption, Secure public-key encryption scheme without random oracles, The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure, Improved efficiency of Kiltz07-KEM, Direct chosen-ciphertext secure identity-based key encapsulation without random oracles, The twin Diffie-Hellman problem and applications, Practical chosen ciphertext secure encryption from factoring, Secure integration of asymmetric and symmetric encryption schemes, A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack, The TLS handshake protocol: A modular analysis, Efficient hybrid encryption from ID-based encryption, Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism, Compact proofs of retrievability, Generic constructions of identity-based and certificateless kEMs, Wildcarded identity-based encryption, Security models and proof strategies for plaintext-aware encryption, Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts, Certificateless threshold cryptosystem secure against chosen-ciphertext attack, Tag-KEM/DEM: A new framework for hybrid encryption, Lower bounds for non-black-box zero knowledge, Signcryption with non-interactive non-repudiation, On the Joint Security of Encryption and Signature in EMV, Hybrid Signcryption, Key Establishment Using Signcryption Techniques, Security Notions for Broadcast Encryption, Identification Schemes from Key Encapsulation Mechanisms, On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes, Efficient Identity-Based Signcryption in the Standard Model, Constructing Secure Hybrid Encryption from Key Encapsulation Mechanism with Authenticity, A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems, Robust Encryption, Authenticated Key Exchange and Key Encapsulation in the Standard Model, A Brief History of Provably-Secure Public-Key Encryption, Generic Constructions of Stateful Public Key Encryption and Their Applications, Improved proxy re-encryption schemes with applications to secure distributed storage, Efficient Certificateless KEM in the Standard Model, The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model, A Modular Security Analysis of the TLS Handshake Protocol, Chosen Ciphertext Security with Optimal Ciphertext Overhead, Universally Anonymous IBE Based on the Quadratic Residuosity Assumption, Practical Chosen Ciphertext Secure Encryption from Factoring, A New Randomness Extraction Paradigm for Hybrid Encryption, Multi-recipient Public-Key Encryption from Simulators in Security Proofs, Security on Hybrid Encryption with the Tag-KEM/DEM Framework, Anonymity from Public Key Encryption to Undeniable Signatures, A Three-Property-Secure Hash Function