On the Circular Security of Bit-Encryption
From MaRDI portal
Publication:4910299
DOI10.1007/978-3-642-36594-2_32zbMath1315.94100OpenAlexW36745501MaRDI QIDQ4910299
Publication date: 18 March 2013
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-36594-2_32
Related Items (12)
Counterexamples to new circular security assumptions underlying iO ⋮ Reproducible Circularly-Secure Bit Encryption: Applications and Realizations ⋮ Universal amplification of KDM security: from 1-key circular to multi-key KDM ⋮ Lockable obfuscation from circularly insecure fully homomorphic encryption ⋮ Post-quantum insecurity from LWE ⋮ Reproducible circularly secure bit encryption: applications and realizations ⋮ Circular security is complete for KDM security ⋮ Obfuscating conjunctions ⋮ Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings ⋮ Spooky Interaction and Its Discontents: Compilers for Succinct Two-Message Argument Systems ⋮ Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption ⋮ Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions
This page was built for publication: On the Circular Security of Bit-Encryption