Key-dependent message security: generic amplification and completeness
From MaRDI portal
Publication:744344
DOI10.1007/S00145-013-9149-6zbMATH Open1302.94033OpenAlexW2082117735MaRDI QIDQ744344FDOQ744344
Authors: Benny Applebaum
Publication date: 25 September 2014
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-013-9149-6
Recommendations
- Key-dependent message security: generic amplification and completeness
- Efficient key dependent message security amplification against chosen ciphertext attacks
- Circular security is complete for KDM security
- Bounded key-dependent message security
- Towards Key-Dependent Message Security in the Standard Model
Cites Work
- Probabilistic encryption
- Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
- Fully homomorphic encryption using ideal lattices
- Efficient Fully Homomorphic Encryption from (Standard) LWE
- Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits
- Foundations of Cryptography
- Foundations of Cryptography
- Title not available (Why is that?)
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- Circular-Secure Encryption from Decision Diffie-Hellman
- A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
- Title not available (Why is that?)
- Title not available (Why is that?)
- Computationally private randomizing polynomials and their applications
- Title not available (Why is that?)
- Cryptography in $NC^0$
- On the (Im)Possibility of Key Dependent Encryption
- Title not available (Why is that?)
- Towards Key-Dependent Message Security in the Standard Model
- Title not available (Why is that?)
- On arithmetic branching programs
- Title not available (Why is that?)
- Black-box circular-secure encryption beyond affine functions
- Cryptographic agility and its relation to circular encryption
- Bounded key-dependent message security
- OAEP Is Secure under Key-Dependent Messages
- Title not available (Why is that?)
- Computing Blindfolded: New Developments in Fully Homomorphic Encryption
Cited In (27)
- Cryptographic primitives with hinting property
- Universal amplification of KDM security: from 1-key circular to multi-key KDM
- Efficient key dependent message security amplification against chosen ciphertext attacks
- Towards Key-Dependent Message Security in the Standard Model
- Toward fine-grained blackbox separations between semantic and circular-security notions
- Succinct garbling schemes from functional encryption through a local simulation paradigm
- Fiat-Shamir and correlation intractability from strong KDM-secure encryption
- Secret key amplification from uniformly leaked key exchange complete graph
- Title not available (Why is that?)
- Randomness recoverable secret sharing schemes
- On the Power of Secure Two-Party Computation
- Completeness of single-bit projection-KDM security for public key encryption
- Updatable public key encryption in the standard model
- Impossibility of strong KDM security with auxiliary input
- Rate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacks
- Amplifying the security of functional encryption, unconditionally
- Black-box circular-secure encryption beyond affine functions
- Naor-Yung paradigm with shared randomness and applications
- Cryptographic group actions and applications
- On the power of secure two-party computation
- Reproducible circularly secure bit encryption: applications and realizations
- Cryptographic primitives with hinting property
- Circular security is complete for KDM security
- Naor-Yung Paradigm with Shared Randomness and Applications
- Title not available (Why is that?)
- Bounded KDM security from iO and OWF
- Key-dependent message security: generic amplification and completeness
This page was built for publication: Key-dependent message security: generic amplification and completeness
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q744344)