Chosen ciphertext security via UCE
From MaRDI portal
Publication:5402964
DOI10.1007/978-3-642-54631-0_4zbMATH Open1335.94068OpenAlexW57256540MaRDI QIDQ5402964FDOQ5402964
Authors: Takahiro Matsuda, Goichiro Hanaoka
Publication date: 25 March 2014
Published in: Public-Key Cryptography – PKC 2014 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-54631-0_4
Recommendations
- Instantiating random oracles via UCEs
- Using indistinguishability obfuscation via UCEs
- Indistinguishability obfuscation and UCEs: the case of computationally unpredictable sources
- Constructing and understanding chosen ciphertext security via puncturable key encapsulation mechanisms
- Modeling random oracles under unpredictable queries
Cited In (11)
- Point-function obfuscation: a framework and generic constructions
- Upgrading to functional encryption
- Chosen Ciphertext Security with Optimal Ciphertext Overhead
- Public-seed pseudorandom permutations
- Using indistinguishability obfuscation via UCEs
- Indistinguishability obfuscation and UCEs: the case of computationally unpredictable sources
- Contention in cryptoland: obfuscation, leakage and UCE
- Security definitions for hash functions: combining UCE and indifferentiability
- Instantiating random oracles via UCEs
- Modeling random oracles under unpredictable queries
- Cryptography from compression functions: the UCE bridge to the ROM
This page was built for publication: Chosen ciphertext security via UCE
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5402964)