Constructing and understanding chosen ciphertext security via puncturable key encapsulation mechanisms
From MaRDI portal
Publication:5261644
Recommendations
- Relations between constrained and bounded chosen ciphertext security for key encapsulation mechanisms
- Trading plaintext-awareness for simulatability to achieve chosen ciphertext security
- Key encapsulation mechanisms from extractable hash proof systems, revisited
- Simulation-based selective opening CCA security for PKE from key encapsulation mechanisms
- A constructive perspective on key encapsulation
Cited in
(14)- Key encapsulation mechanisms from extractable hash proof systems, revisited
- CPA-to-CCA transformation for KDM security
- Constructing confidential channels from authenticated channels-public-key encryption revisited
- CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors
- Receiver Selective Opening Security from Indistinguishability Obfuscation
- Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRF
- Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption
- Public-key puncturable encryption: modular and compact constructions
- Chosen ciphertext security via UCE
- Trading plaintext-awareness for simulatability to achieve chosen ciphertext security
- Leakage-resilient cryptography from puncturable primitives and obfuscation
- Relations between constrained and bounded chosen ciphertext security for key encapsulation mechanisms
- New technique for chosen-ciphertext security based on non-interactive zero-knowledge
- CCA security and trapdoor functions via key-dependent-message security
This page was built for publication: Constructing and understanding chosen ciphertext security via puncturable key encapsulation mechanisms
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5261644)