Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
From MaRDI portal
Publication:5199212
DOI10.1007/978-3-642-22792-9_31zbMath1290.94050OpenAlexW2185608065MaRDI QIDQ5199212
Publication date: 12 August 2011
Published in: Advances in Cryptology – CRYPTO 2011 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-22792-9_31
Related Items (19)
Signature schemes secure against hard-to-invert leakage ⋮ Witness authenticating NIZKs and applications ⋮ Approximate-Deterministic Public Key Encryption from Hard Learning Problems ⋮ Efficient cryptosystems from \(2^k\)-th power residue symbols ⋮ Updatable all-but-one dual projective hashing and its applications ⋮ Augmented random oracles ⋮ Computational robust (fuzzy) extractors for CRS-dependent sources with minimal min-entropy ⋮ Lossy Key Encapsulation Mechanism and Its Applications ⋮ Towards Tightly Secure Deterministic Public Key Encryption ⋮ Incremental deterministic public-key encryption ⋮ Deterministic public-key encryption for adaptively-chosen plaintext distributions ⋮ Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions ⋮ A generic construction of CCA-secure deterministic encryption ⋮ Point-Function Obfuscation: A Framework and Generic Constructions ⋮ A unified approach to deterministic encryption: new constructions and a connection to computational entropy ⋮ CCA security and trapdoor functions via key-dependent-message security ⋮ CCA-security from adaptive all-but-one lossy trapdoor functions ⋮ Deterministic Public-Key Encryption Under Continual Leakage ⋮ Multi-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input Setting
This page was built for publication: Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting