Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman

From MaRDI portal
Publication:5756539

DOI10.1007/978-3-540-71677-8_19zbMath1127.94016OpenAlexW1533880360WikidataQ59163759 ScholiaQ59163759MaRDI QIDQ5756539

Eike Kiltz

Publication date: 4 September 2007

Published in: Public Key Cryptography – PKC 2007 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-71677-8_19




Related Items (23)

Tight chosen ciphertext attack (CCA)-secure hybrid encryption scheme with full public verifiabilityTowards post-quantum security for signal's X3DH handshakeAn efficient post-quantum KEM from CSIDHChosen ciphertext secure keyed-homomorphic public-key cryptosystemsFully leakage-resilient signaturesGeneric Constructions of Stateful Public Key Encryption and Their ApplicationsEfficient One-Round Key Exchange in the Standard ModelPractical chosen ciphertext secure encryption from factoringLeakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability ObfuscationChosen ciphertext secure fuzzy identity based encryption without ROMStrongly secure authenticated key exchange from factoring, codes, and latticesChosen Ciphertext Secure Keyed-Homomorphic Public-Key EncryptionKey Encapsulation Mechanisms from Extractable Hash Proof Systems, RevisitedEfficient chosen-ciphertext secure certificateless threshold key encapsulation mechanismSubtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed?Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman AssumptionThe Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secureImproved efficiency of Kiltz07-KEMAn Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE TransformationsPractical Chosen Ciphertext Secure Encryption from FactoringA Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext AttacksMulti-recipient Public-Key Encryption from Simulators in Security ProofsMessage Transmission with Reverse Firewalls—Secure Communication on Corrupted Machines


Uses Software



This page was built for publication: Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman