Chosen ciphertext security via UCE
From MaRDI portal
Publication:5402964
Recommendations
- Instantiating random oracles via UCEs
- Using indistinguishability obfuscation via UCEs
- Indistinguishability obfuscation and UCEs: the case of computationally unpredictable sources
- Constructing and understanding chosen ciphertext security via puncturable key encapsulation mechanisms
- Modeling random oracles under unpredictable queries
Cited in
(11)- Instantiating random oracles via UCEs
- Using indistinguishability obfuscation via UCEs
- Upgrading to functional encryption
- Point-function obfuscation: a framework and generic constructions
- Chosen Ciphertext Security with Optimal Ciphertext Overhead
- Indistinguishability obfuscation and UCEs: the case of computationally unpredictable sources
- Modeling random oracles under unpredictable queries
- Security definitions for hash functions: combining UCE and indifferentiability
- Contention in cryptoland: obfuscation, leakage and UCE
- Public-seed pseudorandom permutations
- Cryptography from compression functions: the UCE bridge to the ROM
This page was built for publication: Chosen ciphertext security via UCE
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5402964)