Towards Key-Dependent Message Security in the Standard Model
From MaRDI portal
Publication:5458588
DOI10.1007/978-3-540-78967-3_7zbMATH Open1149.94321DBLPconf/eurocrypt/HofheinzU08OpenAlexW2139440619WikidataQ62038965 ScholiaQ62038965MaRDI QIDQ5458588FDOQ5458588
Authors: Dennis Hofheinz, Dominique Unruh
Publication date: 15 April 2008
Published in: Advances in Cryptology – EUROCRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-78967-3_7
Recommendations
Cites Work
- Probabilistic encryption
- Title not available (Why is that?)
- A Pseudorandom Generator from any One-way Function
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Advances in Cryptology - CRYPTO 2003
- On the security of public key protocols
- Magic functions
- Theory of Cryptography
- Reconciling two views of cryptography (The computational soundness of formal encryption)
- Theory of Cryptography
- On IND-CCA security modeling in cryptographic protocols
- Soundness of Formal Encryption in the Presence of Key-Cycles
Cited In (21)
- A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
- On symmetric encryption and point obfuscation
- OAEP Is Secure under Key-Dependent Messages
- Universal amplification of KDM security: from 1-key circular to multi-key KDM
- KDM security in the hybrid framework
- Security of message authentication codes in the presence of key-dependent messages
- Circular chosen-ciphertext security with compact ciphertexts
- On the (Im)Possibility of Key Dependent Encryption
- Information Security and Privacy
- Randomness-dependent message security
- Fiat-Shamir and correlation intractability from strong KDM-secure encryption
- Secret Key and Private Key Constructions for Simple Multiterminal Source Models
- Title not available (Why is that?)
- Key-dependent message security: generic amplification and completeness
- Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model
- Rate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacks
- Bounded key-dependent message security
- Security of signature schemes in the presence of key-dependent messages
- Encryption schemes secure under related-key and key-dependent message attacks
- Key-dependent message security for division function: discouraging anonymous credential sharing
- Bounded KDM security from iO and OWF
This page was built for publication: Towards Key-Dependent Message Security in the Standard Model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458588)