The KDM-CCA Security of REACT
From MaRDI portal
Publication:5056009
DOI10.1007/978-3-319-72359-4_5zbMATH Open1506.94031OpenAlexW2771660230MaRDI QIDQ5056009FDOQ5056009
Authors: Jinyong Chang, H. L. Dai, Maozhi Xu
Publication date: 9 December 2022
Published in: Information Security Practice and Experience (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-72359-4_5
Recommendations
- KDM-CCA Security from RKA Secure Authenticated Encryption
- CPA-to-CCA transformation for KDM security
- scientific article; zbMATH DE number 1497864
- KDM security in the hybrid framework
- A framework for achieving KDM-CCA secure public-key encryption
- scientific article; zbMATH DE number 2086506
- RCCA security for KEM+DEM style hybrid encryptions
- Theory of Cryptography
- scientific article; zbMATH DE number 1617925
Cites Work
- Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
- Fully homomorphic encryption using ideal lattices
- Title not available (Why is that?)
- Secure integration of asymmetric and symmetric encryption schemes
- Title not available (Why is that?)
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- Circular-Secure Encryption from Decision Diffie-Hellman
- A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
- Title not available (Why is that?)
- Title not available (Why is that?)
- Encryption schemes secure under related-key and key-dependent message attacks
- On the (Im)Possibility of Key Dependent Encryption
- Title not available (Why is that?)
- Title not available (Why is that?)
- Black-box circular-secure encryption beyond affine functions
- Bounded key-dependent message security
- OAEP Is Secure under Key-Dependent Messages
- Key-dependent message security: generic amplification and completeness
- Efficient KDM-CCA secure public-key encryption for polynomial functions
- New definitions and separations for circular security
- KDM security for identity-based encryption: constructions and separations
- On the key dependent message security of the Fujisaki-Okamoto constructions
- KDM security in the hybrid framework
This page was built for publication: The KDM-CCA Security of REACT
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5056009)