Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures

From MaRDI portal
Publication:5418714

DOI10.1007/978-3-642-55220-5_29zbMath1300.94111OpenAlexW1733633233MaRDI QIDQ5418714

No author found.

Publication date: 27 May 2014

Published in: Advances in Cryptology – EUROCRYPT 2014 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-55220-5_29




Related Items (28)

On QA-NIZK in the BPK ModelSmooth NIZK argumentsQA-NIZK Arguments of Same Opening for Bilateral CommitmentsOn the statistical leak of the GGH13 multilinear map and some variantsStructure-Preserving Signatures from Standard Assumptions, RevisitedShort Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple AssumptionsSubversion-resistant quasi-adaptive NIZK and applications to modular zk-SNARKsSubversion-resilient enhanced privacy IDChosen ciphertext secure keyed-homomorphic public-key cryptosystemsImproved, black-box, non-malleable encryption from semantic securityLinearly homomorphic structure-preserving signatures and their applicationsQANIZK for adversary-dependent languages and their applicationsChosen ciphertext secure keyed two-level homomorphic encryptionThe Kernel Matrix Diffie-Hellman AssumptionTraceable receipt-free encryptionCRS-updatable asymmetric quasi-adaptive NIZK argumentsShorter quasi-adaptive NIZK proofs for linear subspacesImpossibilities in succinct arguments: black-box extraction and moreAdaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructionsAn algebraic framework for Diffie-Hellman assumptionsStructure-Preserving Chosen-Ciphertext Security with Shorter Verifiable CiphertextsElection control through social influence with unknown preferencesUnbounded inner product functional encryption from bilinear mapsFully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval modelNew Techniques for Non-interactive Shuffle and Range ArgumentsNon-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairingsKeyed-fully homomorphic encryption without indistinguishability obfuscationShorter non-interactive zero-knowledge arguments and ZAPs for algebraic languages




This page was built for publication: Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures