Compact and tightly selective-opening secure public-key encryption schemes
From MaRDI portal
Publication:6135440
DOI10.1007/978-3-031-22969-5_13zbMath1519.94181OpenAlexW4317928206MaRDI QIDQ6135440
Publication date: 25 August 2023
Published in: Advances in Cryptology – ASIACRYPT 2022 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-22969-5_13
Cites Work
- Kurosawa-Desmedt meets tight security
- All-but-many lossy trapdoor functions and selective opening chosen-ciphertext security from LWE
- A modular analysis of the Fujisaki-Okamoto transformation
- Tightly SIM-SO-CCA secure public key encryption from standard assumptions
- Secure integration of asymmetric and symmetric encryption schemes
- Tightly-secure authenticated key exchange, revisited
- More efficient digital signatures with tight multi-user security
- Tight leakage-resilient CCA-security from quasi-adaptive hash proof system
- Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based
- An Algebraic Framework for Diffie-Hellman Assumptions
- Fully, (Almost) Tightly Secure IBE and Dual System Groups
- All-But-Many Lossy Trapdoor Functions
- Standard Security Does Not Imply Security against Selective-Opening
- On Definitions of Selective Opening Security
- Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms
- On the Selective Opening Security of Practical Public-Key Encryption Schemes
- Selective Opening Security from Simulatable Data Encapsulation
- Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security
- Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts
- Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
- The Twin Diffie-Hellman Problem and Applications
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Compact and tightly selective-opening secure public-key encryption schemes