Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
From MaRDI portal
Publication:5918309
DOI10.1007/s00145-021-09374-3zbMath1475.94111OpenAlexW3134730287WikidataQ121295915 ScholiaQ121295915MaRDI QIDQ5918309
David Derler, Kai Gellert, Tibor Jager, Christoph Striecks, Daniel Slamanig
Publication date: 28 June 2021
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-021-09374-3
Cryptography (94A60) Data structures (68P05) Authentication, digital signatures and secret sharing (94A62)
Related Items (4)
Public-Key Puncturable Encryption: Modular and Compact Constructions ⋮ CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors ⋮ Incremental symmetric puncturable encryption with support for unbounded number of punctures ⋮ Offline witness encryption with semi-adaptive security
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A modular analysis of the Fujisaki-Okamoto transformation
- Revisiting proxy re-encryption: forward secrecy, improved security, and applications
- Updating key size estimations for pairings
- Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs
- Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case
- Fully, (Almost) Tightly Secure IBE and Dual System Groups
- (Hierarchical) Identity-Based Encryption from Affine Message Authentication
- One-Pass HMQV and Asymmetric Key-Wrapping
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Bloom Filters in Adversarial Environments
- Efficient Lattice (H)IBE in the Standard Model
- Hierarchical ID-Based Cryptography
- Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures
- Secure integration of asymmetric and symmetric encryption schemes
- Public-Key Puncturable Encryption: Modular and Compact Constructions
- 0-RTT Key Exchange with Full Forward Secrecy
- Advances in Cryptology - EUROCRYPT 2004
- Watermarking cryptographic capabilities
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- A Space Lower Bound for Dynamic Approximate Membership Data Structures
- Pairing-Friendly Elliptic Curves of Prime Order
- Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
- Space/time trade-offs in hash coding with allowable errors
- Chosen-Ciphertext Secure Fully Homomorphic Encryption
- Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
- Session resumption protocols and efficient forward security for TLS 1.3 0-RTT
This page was built for publication: Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange