Advances in Cryptology - EUROCRYPT 2004
From MaRDI portal
Publication:5307253
DOI10.1007/B97182zbMATH Open1122.94350DBLPconf/eurocrypt/2004OpenAlexW2477185671MaRDI QIDQ5307253FDOQ5307253
Authors: M. Bellare, Alexandra Boldyreva, Adriana Palacio
Publication date: 25 September 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b97182
Recommendations
- Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes
- scientific article; zbMATH DE number 1775406
- Instantiability of classical random-oracle-model encryption transforms
- The random oracle methodology, revisited.
- Secure integration of asymmetric and symmetric encryption schemes
Cited In (32)
- Random oracles and non-uniformity
- Security of Encryption Schemes in Weakened Random Oracle Models
- Identity-based threshold decryption on access structure
- Proxy Re-signature Schemes Without Random Oracles
- A random oracle for all of us
- Theory of Cryptography
- Certificateless signature scheme with security enhanced in the standard model
- On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
- An improved efficient identity-based proxy signature in the standard model
- Completely Non-malleable Encryption Revisited
- Fully Anonymous Group Signatures Without Random Oracles
- Cryptography and algorithmic randomness
- Efficient identity-based signcryption in the standard model
- A formal security analysis of the Signal messaging protocol
- Secure and efficient identity-based proxy signature scheme in the standard model based on computational Diffie-Hellman problem
- Practical Threshold Signatures Without Random Oracles
- Formal Indistinguishability Extended to the Random Oracle Model
- Instantiability of classical random-oracle-model encryption transforms
- Identity-based partially blind signature in the standard model for electronic cash
- The random oracle model: a twenty-year retrospective
- Interactive oracle proofs
- A strong designated verifier signature scheme tightly related to the LRSW assumption
- A Note on the Instantiability of the Quantum Random Oracle
- A unified approach to idealized model separations via indistinguishability obfuscation
- Secure identity-based signcryption in the standard model
- Certificateless threshold signature secure in the standard model
- How to Build a Hash Function from Any Collision-Resistant Function
- Combining Encryption and Proof of Knowledge in the Random Oracle Model
- Rate-1 incompressible encryption from standard assumptions
- Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles
- Broadcast encryption based non-interactive key distribution in MANETs
- To label, or not to label (in generic groups)
This page was built for publication: Advances in Cryptology - EUROCRYPT 2004
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5307253)