Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman
From MaRDI portal
Publication:5756539
DOI10.1007/978-3-540-71677-8_19zbMath1127.94016OpenAlexW1533880360WikidataQ59163759 ScholiaQ59163759MaRDI QIDQ5756539
Publication date: 4 September 2007
Published in: Public Key Cryptography – PKC 2007 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-71677-8_19
Related Items (23)
Tight chosen ciphertext attack (CCA)-secure hybrid encryption scheme with full public verifiability ⋮ Towards post-quantum security for signal's X3DH handshake ⋮ An efficient post-quantum KEM from CSIDH ⋮ Chosen ciphertext secure keyed-homomorphic public-key cryptosystems ⋮ Fully leakage-resilient signatures ⋮ Generic Constructions of Stateful Public Key Encryption and Their Applications ⋮ Efficient One-Round Key Exchange in the Standard Model ⋮ Practical chosen ciphertext secure encryption from factoring ⋮ Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation ⋮ Chosen ciphertext secure fuzzy identity based encryption without ROM ⋮ Strongly secure authenticated key exchange from factoring, codes, and lattices ⋮ Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption ⋮ Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited ⋮ Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism ⋮ Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed? ⋮ Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption ⋮ The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure ⋮ Improved efficiency of Kiltz07-KEM ⋮ An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations ⋮ Practical Chosen Ciphertext Secure Encryption from Factoring ⋮ A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks ⋮ Multi-recipient Public-Key Encryption from Simulators in Security Proofs ⋮ Message Transmission with Reverse Firewalls—Secure Communication on Corrupted Machines
Uses Software
This page was built for publication: Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman