Compact and tightly selective-opening secure public-key encryption schemes
From MaRDI portal
Publication:6135440
Recommendations
- Tightly SIM-SO-CCA secure public key encryption from standard assumptions
- Public-key encryption with simulation-based selective-opening security and compact ciphertexts
- On the selective opening security of practical public-key encryption schemes
- Public-key encryption with selective opening security from general assumptions
- Public-key encryption with simulation-based sender selective-opening security
Cites Work
- scientific article; zbMATH DE number 1617924 (Why is no real title available?)
- scientific article; zbMATH DE number 1088907 (Why is no real title available?)
- scientific article; zbMATH DE number 1842484 (Why is no real title available?)
- A modular analysis of the Fujisaki-Okamoto transformation
- All-but-many lossy trapdoor functions
- All-but-many lossy trapdoor functions and selective opening chosen-ciphertext security from LWE
- An algebraic framework for Diffie-Hellman assumptions
- Encryption schemes secure against chosen-ciphertext selective opening attacks
- Fully, (Almost) Tightly Secure IBE and Dual System Groups
- Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based
- Kurosawa-Desmedt meets tight security
- Lossy encryption: Constructions from general assumptions and efficient selective opening chosen ciphertext security
- More efficient digital signatures with tight multi-user security
- On definitions of selective opening security
- On the selective opening security of practical public-key encryption schemes
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
- Public-key encryption with simulation-based selective-opening security and compact ciphertexts
- Secure integration of asymmetric and symmetric encryption schemes
- Selective opening security from simulatable data encapsulation
- Simulation-based selective opening CCA security for PKE from key encapsulation mechanisms
- Standard security does not imply security against selective-opening
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- The Twin Diffie-Hellman Problem and Applications
- Tight leakage-resilient CCA-security from quasi-adaptive hash proof system
- Tightly SIM-SO-CCA secure public key encryption from standard assumptions
- Tightly-secure authenticated key exchange, revisited
Cited In (10)
- SEA: A Scalable Encryption Algorithm for Small Embedded Applications
- Compact public key encryption with minimum ideal property of hash functions
- Tighter security for generic authenticated key exchange in the QROM
- Compact selective opening security from LWE
- Selective opening security in the quantum random oracle model, revisited
- On shortening ciphertexts: new constructions for compact public key and stateful encryption schemes
- Tightly SIM-SO-CCA secure public key encryption from standard assumptions
- On the selective opening security of practical public-key encryption schemes
- Public-key encryption with simulation-based selective-opening security and compact ciphertexts
- Memory-Tight Reductions for Practical Key Encapsulation Mechanisms
This page was built for publication: Compact and tightly selective-opening secure public-key encryption schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6135440)