Anamorphic encryption: new constructions and homomorphic realizations
From MaRDI portal
Publication:6636498
Recommendations
Cites work
- scientific article; zbMATH DE number 1302835 (Why is no real title available?)
- scientific article; zbMATH DE number 708801 (Why is no real title available?)
- scientific article; zbMATH DE number 1030994 (Why is no real title available?)
- scientific article; zbMATH DE number 1088228 (Why is no real title available?)
- scientific article; zbMATH DE number 1088240 (Why is no real title available?)
- A public-key encryption scheme with pseudo-random ciphertexts
- Advances in Cryptology - EUROCRYPT 2004
- An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information
- Anamorphic encryption: private communication against a dictator
- Anamorphic signatures: secrecy from a dictator who only permits authentication!
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Fully homomorphic NIZK and NIWI proofs
- Fully homomorphic encryption using ideal lattices
- Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based
- Sender-anamorphic encryption reformulated: achieving robust and generic constructions
- The dark side of ``black-box cryptography or: should we trust Capstone?
- Trapdoors for lattices: simpler, tighter, faster, smaller
- Using hash functions as a hedge against chosen ciphertext attack
Cited in
(5)- Sender-anamorphic encryption reformulated: achieving robust and generic constructions
- Limits of black-box anamorphic encryption
- Public-key anamorphism in (CCA-secure) public-key encryption and beyond
- Anamorphic signatures: secrecy from a dictator who only permits authentication!
- Anamorphic encryption, revisited
This page was built for publication: Anamorphic encryption: new constructions and homomorphic realizations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6636498)