Compact and tightly selective-opening secure public-key encryption schemes
From MaRDI portal
Publication:6135440
DOI10.1007/978-3-031-22969-5_13zbMATH Open1519.94181OpenAlexW4317928206MaRDI QIDQ6135440FDOQ6135440
Authors: Jia-xin Pan, Runzhi Zeng
Publication date: 25 August 2023
Published in: Advances in Cryptology – ASIACRYPT 2022 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-22969-5_13
Recommendations
- Tightly SIM-SO-CCA secure public key encryption from standard assumptions
- Public-key encryption with simulation-based selective-opening security and compact ciphertexts
- On the selective opening security of practical public-key encryption schemes
- Public-key encryption with selective opening security from general assumptions
- Public-key encryption with simulation-based sender selective-opening security
Cites Work
- Fully, (Almost) Tightly Secure IBE and Dual System Groups
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Title not available (Why is that?)
- Tightly-secure authenticated key exchange, revisited
- Secure integration of asymmetric and symmetric encryption schemes
- All-but-many lossy trapdoor functions
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
- The Twin Diffie-Hellman Problem and Applications
- Title not available (Why is that?)
- Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based
- An Algebraic Framework for Diffie-Hellman Assumptions
- More efficient digital signatures with tight multi-user security
- Standard security does not imply security against selective-opening
- On definitions of selective opening security
- Lossy encryption: Constructions from general assumptions and efficient selective opening chosen ciphertext security
- Encryption schemes secure against chosen-ciphertext selective opening attacks
- All-but-many lossy trapdoor functions and selective opening chosen-ciphertext security from LWE
- Tightly SIM-SO-CCA secure public key encryption from standard assumptions
- Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms
- On the Selective Opening Security of Practical Public-Key Encryption Schemes
- Selective Opening Security from Simulatable Data Encapsulation
- Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts
- A modular analysis of the Fujisaki-Okamoto transformation
- Title not available (Why is that?)
- Kurosawa-Desmedt meets tight security
- Tight leakage-resilient CCA-security from quasi-adaptive hash proof system
Cited In (6)
- SEA: A Scalable Encryption Algorithm for Small Embedded Applications
- Tighter security for generic authenticated key exchange in the QROM
- Compact selective opening security from LWE
- Selective opening security in the quantum random oracle model, revisited
- On shortening ciphertexts: new constructions for compact public key and stateful encryption schemes
- Memory-Tight Reductions for Practical Key Encapsulation Mechanisms
This page was built for publication: Compact and tightly selective-opening secure public-key encryption schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6135440)