Some (in)sufficient conditions for secure hybrid encryption
From MaRDI portal
Publication:710738
DOI10.1016/j.ic.2010.07.002zbMath1205.68148WikidataQ59163712 ScholiaQ59163712MaRDI QIDQ710738
Dennis Hofheinz, Javier Herranz, Eike Kiltz
Publication date: 22 October 2010
Published in: Information and Computation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ic.2010.07.002
68P25: Data encryption (aspects in computer science)
Related Items
Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression, Toward a Generic Construction of Universally Convertible Undeniable Signatures from Pairing-Based Signatures, Sender-binding key encapsulation, Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model, Non-malleable encryption: simpler, shorter, stronger, Improved, black-box, non-malleable encryption from semantic security, Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression, Constructing Secure Hybrid Encryption from Key Encapsulation Mechanism with Authenticity, Security on Hybrid Encryption with the Tag-KEM/DEM Framework, Anonymity from Public Key Encryption to Undeniable Signatures
Uses Software
Cites Work
- The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure
- Characterization of security notions for probabilistic private-key encryption
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Foundations of Cryptography
- Advances in Cryptology – CRYPTO 2004
- Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM
- Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One
- Relationship of Three Cryptographic Channels in the UC Framework
- Theory of Cryptography
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item