Pages that link to "Item:Q5261684"
From MaRDI portal
The following pages link to Separations in Circular Security for Arbitrary Length Key Cycles (Q5261684):
Displaying 13 items.
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation (Q1688405) (← links)
- Counterexamples to new circular security assumptions underlying iO (Q2128580) (← links)
- KDM security for identity-based encryption: constructions and separations (Q2215124) (← links)
- Circular security is complete for KDM security (Q2692344) (← links)
- Bounded KDM Security from iO and OWF (Q2827740) (← links)
- Three’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE (Q2829234) (← links)
- Circular Security Separations for Arbitrary Length Cycles from LWE (Q2829235) (← links)
- Standard Security Does Not Imply Indistinguishability Under Selective Opening (Q3181024) (← links)
- Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption (Q5267417) (← links)
- Separating IND-CPA and Circular Security for Unbounded Length Key Cycles (Q5738789) (← links)
- Universal amplification of KDM security: from 1-key circular to multi-key KDM (Q6145929) (← links)
- Lockable obfuscation from circularly insecure fully homomorphic encryption (Q6169028) (← links)
- Post-quantum insecurity from LWE (Q6169346) (← links)