Secure integration of asymmetric and symmetric encryption schemes

From MaRDI portal
Publication:4941878

zbMath0942.94019MaRDI QIDQ4941878

Eiichiro Fujisaki, Tatsuaki Okamoto

Publication date: 27 August 2000





Related Items (only showing first 100 items - show all)

A New Paradigm for Public-Key Functional Encryption for Degree-2 PolynomialsDecryption Failure Is More Likely After SuccessEncryption Schemes Using Random Oracles: From Classical to Post-Quantum SecurityA more efficient accountable authority IBE scheme under the DL assumptionSakai-Kasahara IBEThe KDM-CCA Security of REACTOn the Impossibility of Strong Encryption Over $\aleph_0$A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMsGladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed DecryptionSHealS and HealS: Isogeny-Based PKEs from a Key Validation Method for SIDHModular Design of Role-Symmetric Authenticated Key Exchange ProtocolsA side-channel secret key recovery attack on CRYSTALS-Kyber using \(k\) chosen ciphertextsOne-hot conversion: towards faster table-based A2B conversionSimple, fast, efficient, and tightly-secure non-malleable non-interactive timed commitmentsA flexible shared hardware accelerator for NIST-recommended algorithms CRYSTALS-Kyber and CRYSTALS-Dilithium with SCA protectionUnique-path identity based encryption with applications to strongly secure messagingRandomized half-ideal cipher on groups with applications to UC (a)PAKESystematic study of decryption and re-encryption leakage: the case of KyberFast first-order masked NTTRUMulti-instance secure public-key encryptionPost-quantum anonymity of KyberQCCA-secure generic transformations in the quantum random oracle modelA lightweight identification protocol based on lattices\texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryptionAn injectivity analysis of Crystals-Kyber and implications on quantum securityImplicit rejection in Fujisaki-Okamoto: framework and a novel realizationGroup action key encapsulation and non-interactive key exchange in the QROMYou can sign but not decrypt: hierarchical integrated encryption and signatureIND-CCA security of Kyber in the quantum random oracle model, revisitedHigher-order masked SaberEncryption to the future. A paradigm for sending secret messages to future (anonymous) committeesMemory-tight multi-challenge security of public-key encryptionOn the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle modelTight adaptive reprogramming in the QROMFault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidatesHierarchical integrated signature and encryption. (or: key separation vs. key reuse: enjoy the best of both worlds)Fault-enabled chosen-ciphertext attacks on KyberPolar coding for ring-LWE-based public key encryptionAugmented random oraclesA new key recovery side-channel attack on HQC with chosen ciphertextPost-quantum asynchronous deniable key exchange and the signal handshakeHow to sample a discrete Gaussian (and more) from a random oracleA one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attackA code-based hybrid signcryption schemeInstantiability of classical random-oracle-model encryption transformsFailing gracefully: decryption failures and the Fujisaki-Okamoto transformSecure Implementation of Lattice-Based Encryption SchemesA lattice-based forward secure IBE scheme for Internet of thingsGeneric conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertextsEfficient Compression of SIDH Public KeysGroup signatures and more from isogenies and lattices: generic, simple, and efficientBloom filter encryption and applications to efficient forward-secret 0-RTT key exchangePublic Key Broadcast Encryption with Low Number of Keys and Constant Decryption TimeEfficient KEMs with Partial Message RecoveryRandomness Reuse: Extensions and ImprovementsOn the Anonymity of Multi-Receiver Identity-Based Encryption Based on Fujisaki–Okamoto TransformationPairing-Free Identity-Based Encryption with Authorized Equality Test in Online Social NetworksA Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption PowerStrongly Secure Certificateless Public Key Encryption Without PairingThe Twin Diffie-Hellman Problem and ApplicationsOn Quantum Chosen-Ciphertext Attacks and Learning with ErrorsEscrow-free encryption supporting cryptographic workflowChosen-Ciphertext Secure Proxy Re-encryption without PairingsEfficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast EncryptionLeaky Random Oracle (Extended Abstract)0-RTT Key Exchange with Full Forward SecrecyAn efficient IBE scheme with tight security reduction in the random oracle modelEnhanced public key security for the McEliece cryptosystemDesign of image cipher using Latin squaresA practical approach to attaining chosen ciphertext securityTowards post-quantum security for signal's X3DH handshakeUpgrading to functional encryptionTightly secure signatures and public-key encryptionQuantum lattice enumeration and tweaking discrete pruningOn the hardness of the computational ring-LWR problem and its applicationsFull key recovery side-channel attack against ephemeral SIKE on the cortex-M4A monolithic hardware implementation of Kyber: comparing apples to apples in PQC candidatesRevocable policy-based chameleon hashPost-Quantum Security of the Fujisaki-Okamoto and OAEP TransformsFine-grained forward secrecy: allow-list/deny-list encryption and applicationsFO-like combiners and hybrid post-quantum cryptographyA new adaptive attack on SIDHAn Efficient and Provably Secure Certificate-Based Encryption SchemeAn efficient post-quantum KEM from CSIDHConstructing parallel long-message signcryption scheme from trapdoor permutationCertificateless Proxy Re-Encryption Without PairingsEfficient Code Based Hybrid and Deterministic Encryptions in the Standard ModelTightly secure ring-LWE based key encapsulation with short ciphertextsGroup signatures and more from isogenies and lattices: generic, simple, and efficientAnonymous, robust post-quantum public key encryptionAnonymity of NIST PQC round 3 KEMsOn IND-qCCA security in the ROM and its applications. CPA security is sufficient for TLS 1.3Chosen ciphertext secure authenticated group communication using identity-based signcryptionTighter proofs of CCA security in the quantum random oracle modelSmall leaks sink a great ship: an evaluation of key reuse resilience of PQC third round finalist NTRU-HRSSSystematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practiceIterated Random Oracle: A Universal Approach for Finding Loss in Security ReductionOne-time encryption-key technique for the traditional DL-based encryption scheme with anonymityChosen-ciphertext secure bidirectional proxy re-encryption schemes without pairingsAttribute-Based Broadcast Encryption Scheme Made Efficient




This page was built for publication: Secure integration of asymmetric and symmetric encryption schemes