Better security for deterministic public-key encryption: the auxiliary-input setting
From MaRDI portal
Publication:744600
Recommendations
- Better security for deterministic public-key encryption: the auxiliary-input setting
- Deterministic public key encryption and identity-based encryption from lattices in the auxiliary-input setting
- On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
- Deterministic public-key encryption for adaptively-chosen plaintext distributions
- Deterministic public-key encryption for adaptively chosen plaintext distributions
Cites work
- scientific article; zbMATH DE number 1088253 (Why is no real title available?)
- A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy
- A simple BGN-type cryptosystem from LWE
- Building lossy trapdoor functions from lossy encryption
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- Circular-Secure Encryption from Decision Diffie-Hellman
- Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles
- Deterministic and Efficiently Searchable Encryption
- Dual projective hashing and its applications -- lossy trapdoor functions and more
- Foundations of Cryptography
- Hedged public-key encryption: how to protect against bad randomness
- How to fool an unbounded adversary with a short key
- Incremental Deterministic Public-Key Encryption
- Lossy Trapdoor Functions and Their Applications
- More constructions of lossy and correlation-secure trapdoor functions
- On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
- On cryptography with auxiliary input
- Probabilistic encryption
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Public-Key Cryptosystems Resilient to Key Leakage
- Public-key encryption schemes with auxiliary inputs
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Theory of Cryptography
- Theory of Cryptography
Cited in
(3)
This page was built for publication: Better security for deterministic public-key encryption: the auxiliary-input setting
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q744600)