Public-Key Encryption with Non-interactive Opening
From MaRDI portal
Publication:5458943
DOI10.1007/978-3-540-79263-5_15zbMATH Open1161.94393OpenAlexW2110326321WikidataQ59163747 ScholiaQ59163747MaRDI QIDQ5458943FDOQ5458943
Authors: Dennis Hofheinz, Eike Kiltz, Rune Thorbek, Ivan B. Damgård
Publication date: 24 April 2008
Published in: Topics in Cryptology – CT-RSA 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-79263-5_15
Recommendations
- Public-key encryption with non-interactive opening: new constructions and stronger definitions
- Public-key encryption with selective opening security from general assumptions
- Non-interactive key exchange
- Non-associative public-key cryptography
- A generic construction from selective-IBE to public-key encryption with non-interactive opening
- Practical public key encryption with selective opening security for receivers
- Theory of Cryptography
Cited In (13)
- Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles
- Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency
- PRE: stronger security notions and efficient construction with non-interactive opening
- The ECCA Security of Hybrid Encryptions
- Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions
- Public-key encryption with non-interactive opening: new constructions and stronger definitions
- Efficient threshold encryption from lossy trapdoor functions
- Chosen-ciphertext secure dual-receiver encryption in the standard model based on post-quantum assumptions
- Universal Composition with Responsive Environments
- An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users
- Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions
- A generic construction from selective-IBE to public-key encryption with non-interactive opening
- Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening
This page was built for publication: Public-Key Encryption with Non-interactive Opening
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5458943)