Theory of Cryptography
From MaRDI portal
Publication:5711643
DOI10.1007/B106171zbMATH Open1079.94545OpenAlexW4251449056MaRDI QIDQ5711643FDOQ5711643
Authors: Yevgeniy Dodis, Jonathan Katz
Publication date: 7 December 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b106171
Recommendations
Cited In (34)
- Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions
- The Multi-user Security of Double Encryption
- Chosen-Ciphertext Secure RSA-Type Cryptosystems
- Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency
- Efficient Certificate-Based Encryption in the Standard Model
- Chosen-Ciphertext Secure Fully Homomorphic Encryption
- Robust encryption
- Chosen Ciphertext Security with Optimal Ciphertext Overhead
- Security of Sequential Multiple Encryption
- Combiners for chosen-ciphertext security
- Towards certificate-based group encryption
- Short Integrated PKE+PEKS in Standard Model
- Title not available (Why is that?)
- FO-like combiners and hybrid post-quantum cryptography
- Post-challenge leakage in public-key encryption
- Topics in Cryptology – CT-RSA 2005
- An efficient post-quantum one-time signature scheme
- Dynamic threshold public-key encryption with decryption consistency from static assumptions
- Efficient threshold encryption from lossy trapdoor functions
- Adaptively secure non-interactive threshold cryptosystems
- Generic constructions of integrated PKE and PEKS
- One-time signatures and chameleon hash functions
- Public Key Cryptography – PKC 2004
- Multiple encryption with minimum key
- Obfuscation combiners
- Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings
- Error-Tolerant Combiners for Oblivious Primitives
- Timed-release computational secret sharing and threshold encryption
- Amplification of Chosen-Ciphertext Security
- Threshold encryption into multiple ciphertexts
- Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext
- An efficient and provably secure certificate-based encryption scheme
- Ciphertext Policy Multi-dimensional Range Encryption
- Two phases encryption and its applications
This page was built for publication: Theory of Cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5711643)