Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures
From MaRDI portal
Publication:5418714
DOI10.1007/978-3-642-55220-5_29zbMath1300.94111OpenAlexW1733633233MaRDI QIDQ5418714
No author found.
Publication date: 27 May 2014
Published in: Advances in Cryptology – EUROCRYPT 2014 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-55220-5_29
Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (28)
On QA-NIZK in the BPK Model ⋮ Smooth NIZK arguments ⋮ QA-NIZK Arguments of Same Opening for Bilateral Commitments ⋮ On the statistical leak of the GGH13 multilinear map and some variants ⋮ Structure-Preserving Signatures from Standard Assumptions, Revisited ⋮ Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions ⋮ Subversion-resistant quasi-adaptive NIZK and applications to modular zk-SNARKs ⋮ Subversion-resilient enhanced privacy ID ⋮ Chosen ciphertext secure keyed-homomorphic public-key cryptosystems ⋮ Improved, black-box, non-malleable encryption from semantic security ⋮ Linearly homomorphic structure-preserving signatures and their applications ⋮ QANIZK for adversary-dependent languages and their applications ⋮ Chosen ciphertext secure keyed two-level homomorphic encryption ⋮ The Kernel Matrix Diffie-Hellman Assumption ⋮ Traceable receipt-free encryption ⋮ CRS-updatable asymmetric quasi-adaptive NIZK arguments ⋮ Shorter quasi-adaptive NIZK proofs for linear subspaces ⋮ Impossibilities in succinct arguments: black-box extraction and more ⋮ Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions ⋮ An algebraic framework for Diffie-Hellman assumptions ⋮ Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts ⋮ Election control through social influence with unknown preferences ⋮ Unbounded inner product functional encryption from bilinear maps ⋮ Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model ⋮ New Techniques for Non-interactive Shuffle and Range Arguments ⋮ Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings ⋮ Keyed-fully homomorphic encryption without indistinguishability obfuscation ⋮ Shorter non-interactive zero-knowledge arguments and ZAPs for algebraic languages
This page was built for publication: Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures