Pages that link to "Item:Q5428142"
From MaRDI portal
The following pages link to Advances in Cryptology - CRYPTO 2003 (Q5428142):
Displaying 50 items.
- Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles (Q387810) (← links)
- Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security (Q418306) (← links)
- Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search (Q690450) (← links)
- SEMD: secure and efficient message dissemination with policy enforcement in VANET (Q736616) (← links)
- Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited (Q747509) (← links)
- Natural sd-RCCA secure public-key encryptions (Q1616878) (← links)
- On the gold standard for security of universal steganography (Q1648780) (← links)
- Chosen ciphertext secure keyed-homomorphic public-key cryptosystems (Q1650427) (← links)
- Group homomorphic encryption: characterizations, impossibility results, and applications (Q1943979) (← links)
- PRE: stronger security notions and efficient construction with non-interactive opening (Q2015128) (← links)
- Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed? (Q2018816) (← links)
- Security under message-derived keys: signcryption in iMessage (Q2055665) (← links)
- Abuse resistant law enforcement access systems (Q2056806) (← links)
- Fully secure ABE with outsourced decryption against chosen ciphertext attack (Q2057133) (← links)
- Revisiting (R)CCA security and replay protection (Q2061954) (← links)
- Transferable e-cash: a cleaner model and the first practical instantiation (Q2061973) (← links)
- Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved (Q2139637) (← links)
- Generic plaintext equality and inequality proofs (Q2145406) (← links)
- Attribute-based conditional proxy re-encryption in the standard model under LWE (Q2148755) (← links)
- Selectively linkable group signatures -- stronger security and preserved verifiability (Q2149824) (← links)
- Composable and finite computational security of quantum message transmission (Q2175915) (← links)
- Joint state composition theorems for public-key encryption and digital signature functionalities with local computation (Q2210436) (← links)
- Non-malleable encryption: simpler, shorter, stronger (Q2210445) (← links)
- Improving the efficiency of re-randomizable and replayable CCA secure public key encryption (Q2229277) (← links)
- Leakage resilience from program obfuscation (Q2318088) (← links)
- Reconciling non-malleability with homomorphic encryption (Q2408582) (← links)
- Universally composable symbolic security analysis (Q2429708) (← links)
- Signcryption schemes with threshold unsigncryption, and applications (Q2439735) (← links)
- Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts (Q2453123) (← links)
- Tag-KEM/DEM: A new framework for hybrid encryption (Q2482338) (← links)
- Hardware security without secure hardware: how to decrypt with a password and a server (Q2664944) (← links)
- Improving speed and security in updatable encryption schemes (Q2691598) (← links)
- CCA updatable encryption against malicious re-encryption attacks (Q2691599) (← links)
- Non-Malleable Encryption: Simpler, Shorter, Stronger (Q2796130) (← links)
- Combiners for Chosen-Ciphertext Security (Q2817868) (← links)
- Message Transmission with Reverse Firewalls—Secure Communication on Corrupted Machines (Q2835593) (← links)
- Augmented Learning with Errors: The Untapped Potential of the Error Term (Q2948191) (← links)
- Universal Composition with Responsive Environments (Q2953797) (← links)
- Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message (Q3194591) (← links)
- Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security (Q3399207) (← links)
- Improved proxy re-encryption schemes with applications to secure distributed storage (Q3546459) (← links)
- Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption (Q3631375) (← links)
- Conditional Proxy Broadcast Re-Encryption (Q3634503) (← links)
- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption (Q4915999) (← links)
- Grey-Box Public-Key Steganography (Q4922136) (← links)
- Amplification of Chosen-Ciphertext Security (Q4924429) (← links)
- Fully Secure Threshold Unsigncryption (Q4933226) (← links)
- The ECCA Security of Hybrid Encryptions (Q5056044) (← links)
- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption (Q5445463) (← links)
- Towards Key-Dependent Message Security in the Standard Model (Q5458588) (← links)