SoK: public key encryption with openings
From MaRDI portal
Publication:6635892
DOI10.1007/978-3-031-57728-4_2MaRDI QIDQ6635892FDOQ6635892
Authors: Carlo Brunetta, Hans Heum, Martijn Stam
Publication date: 12 November 2024
Cites Work
- How to share a secret
- Communication Theory of Secrecy Systems*
- Title not available (Why is that?)
- Foundations of Cryptography
- Tightly-secure authenticated key exchange, revisited
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Title not available (Why is that?)
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Title not available (Why is that?)
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
- Title not available (Why is that?)
- Advances in Cryptology - CRYPTO 2003
- Title not available (Why is that?)
- Possibility and impossibility results for selective decommitments
- Title not available (Why is that?)
- Title not available (Why is that?)
- On the impossibility of tight cryptographic reductions
- Standard security does not imply security against selective-opening
- Encryption schemes secure against chosen-ciphertext selective opening attacks
- Non-malleability under selective opening attacks: implication and separation
- Selective Opening Security for Receivers
- Standard security does not imply indistinguishability under selective opening
- Standard versus selective opening security: separation and equivalence results
- Tightly-secure authenticated key exchange
- Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions
- Title not available (Why is that?)
- Multi-key authenticated encryption with corruptions: reductions are lossy
- Standard Security Does Imply Security Against Selective Opening for Markov Distributions
- Almost tight multi-user security under adaptive corruptions \& leakages in the standard model
- Tightness subtleties for multi-user PKE notions
- Tightly CCA-secure encryption scheme in a multi-user setting with corruptions
- On fingerprinting attacks and length-hiding encryption
- On Hiding a Plaintext Length by Preencryption
- Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks
- Possibility and impossibility results for receiver selective opening secure PKE in the multi-challenge setting
- Simulation-based bi-selective opening security for public key encryption
- Indistinguishability against chosen ciphertext verification attack revisited: the complete picture
- Anonymous public key encryption under corruptions
This page was built for publication: SoK: public key encryption with openings
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6635892)