Relations between robustness and RKA security under public-key encryption
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 1024009 (Why is no real title available?)
- scientific article; zbMATH DE number 1088257 (Why is no real title available?)
- scientific article; zbMATH DE number 2009976 (Why is no real title available?)
- scientific article; zbMATH DE number 2081087 (Why is no real title available?)
- scientific article; zbMATH DE number 1394311 (Why is no real title available?)
- scientific article; zbMATH DE number 1440072 (Why is no real title available?)
- A Closer Look at Anonymity and Robustness in Encryption Schemes
- A method for obtaining digital signatures and public-key cryptosystems
- Advances in Cryptology - EUROCRYPT 2004
- Anonymous broadcast encryption: adaptive security and efficient constructions in the standard model
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Cryptography secure against related-key attacks and tampering
- Fast Software Encryption
- Privacy in Encrypted Content Distribution Using Private Broadcast Encryption
- Probabilistic encryption
- Public Key Encryption against Related Key Attacks
- RKA security beyond the linear barrier: IBE, encryption and signatures
- Robust Encryption
- Robust encryption, revisited
Cited in
(6)
This page was built for publication: Relations between robustness and RKA security under public-key encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q266278)