Chosen-Ciphertext Security via Correlated Products
From MaRDI portal
Publication:5390588
DOI10.1137/100782929zbMath1227.94063OpenAlexW2036149657WikidataQ121261676 ScholiaQ121261676MaRDI QIDQ5390588
Publication date: 4 April 2011
Published in: SIAM Journal on Computing (Search for Journal in Brave)
Full work available at URL: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.113.7164
Related Items (11)
Reproducible Circularly-Secure Bit Encryption: Applications and Realizations ⋮ Improved, black-box, non-malleable encryption from semantic security ⋮ Towards Proofs of Ownership Beyond Bounded Leakage ⋮ Reproducible circularly secure bit encryption: applications and realizations ⋮ A new McEliece-type cryptosystem using Gabidulin-Kronecker product codes ⋮ Non-malleable encryption: simpler, shorter, stronger ⋮ A unified approach to deterministic encryption: new constructions and a connection to computational entropy ⋮ A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model ⋮ Finding Collisions in Interactive Protocols---Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding Commitments ⋮ Chosen ciphertext security from injective trapdoor functions ⋮ Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions
This page was built for publication: Chosen-Ciphertext Security via Correlated Products