Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions
From MaRDI portal
Publication:5458274
DOI10.1007/11941378_13zbMATH Open1175.94067OpenAlexW1534919675MaRDI QIDQ5458274FDOQ5458274
Authors: Jaimee Brown, Juan Manuel González Nieto, Colin A. Boyd
Publication date: 11 April 2008
Published in: Progress in Cryptology - INDOCRYPT 2006 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11941378_13
Recommendations
- Efficient completely non-malleable and RKA secure public key encryptions
- Improving the efficiency of re-randomizable and replayable CCA secure public key encryption
- scientific article; zbMATH DE number 2009959
- A simpler construction of CCA2-secure public-key encryption under general assumptions
- Almost tightly-secure re-randomizable and replayable CCA-secure public key encryption
- An efficient RSA-based certificateless public key encryption scheme
- Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
- Structure-preserving and re-randomizable RCCA-secure public key encryption and its applications
- A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model
Cited In (10)
- A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems
- Security in Communication Networks
- A generic construction of CCA-secure deterministic encryption
- Title not available (Why is that?)
- Title not available (Why is that?)
- CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors
- Structure-preserving and re-randomizable RCCA-secure public key encryption and its applications
- Key size evaluation of provably secure RSA-based encryption schemes
- Some RSA-based encryption schemes with tight security reduction
- Several security schemes constructed using ECC-based self-certified public key cryptosystems
This page was built for publication: Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458274)