Anonymous public key encryption under corruptions
From MaRDI portal
Publication:6135442
DOI10.1007/978-3-031-22969-5_15zbMath1519.94135OpenAlexW4320082795MaRDI QIDQ6135442
Shuai Han, Lin Lyu, Zhengan Huang, Junzuo Lai, Jian Weng
Publication date: 25 August 2023
Published in: Advances in Cryptology – ASIACRYPT 2022 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-22969-5_15
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Security under message-derived keys: signcryption in iMessage
- Can a public blockchain keep a secret?
- Tightly CCA-secure encryption scheme in a multi-user setting with corruptions
- Tight leakage-resilient CCA-security from quasi-adaptive hash proof system
- Simulation-based selective opening security for receivers under chosen-ciphertext attacks
- Possibility and impossibility results for receiver selective opening secure PKE in the multi-challenge setting
- Selective Opening Security for Receivers
- An Algebraic Framework for Diffie-Hellman Assumptions
- Standard Security Does Not Imply Security against Selective-Opening
- On Definitions of Selective Opening Security
- Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks
- A Closer Look at Anonymity and Robustness in Encryption Schemes
- Receiver Selective Opening Security from Indistinguishability Obfuscation
- Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts
- Robust Encryption
- Public Key Cryptography - PKC 2005
- Theory of Cryptography
- Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions
- Anonymous public key encryption under corruptions
This page was built for publication: Anonymous public key encryption under corruptions