Constructing and understanding chosen ciphertext security via puncturable key encapsulation mechanisms
DOI10.1007/978-3-662-46494-6_23zbMATH Open1359.94616OpenAlexW2103782989MaRDI QIDQ5261644FDOQ5261644
Authors: Takahiro Matsuda, Goichiro Hanaoka
Publication date: 6 July 2015
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-46494-6_23
Recommendations
- Relations between constrained and bounded chosen ciphertext security for key encapsulation mechanisms
- Trading plaintext-awareness for simulatability to achieve chosen ciphertext security
- Key encapsulation mechanisms from extractable hash proof systems, revisited
- Simulation-based selective opening CCA security for PKE from key encapsulation mechanisms
- A constructive perspective on key encapsulation
public key encryptionchosen ciphertext securitykey-dependent message secure symmetric-key encryptionpuncturable key encapsulation mechanismsender non-committing encryption
Cited In (8)
- Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption
- CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors
- Receiver Selective Opening Security from Indistinguishability Obfuscation
- CCA security and trapdoor functions via key-dependent-message security
- Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRF
- CPA-to-CCA transformation for KDM security
- Leakage-resilient cryptography from puncturable primitives and obfuscation
- Relations between constrained and bounded chosen ciphertext security for key encapsulation mechanisms
This page was built for publication: Constructing and understanding chosen ciphertext security via puncturable key encapsulation mechanisms
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5261644)