Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system
From MaRDI portal
Publication:1647557
DOI10.1007/s10623-017-0404-yzbMath1420.94071OpenAlexW2753924868MaRDI QIDQ1647557
Shengli Liu, Lin Lyu, Shuai Han
Publication date: 26 June 2018
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-017-0404-y
public-key encryptionrelated-key attacksymmetric encryptionmessage authentication codehash proof system
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- New hash functions and their use in authentication and set equality
- KDM-Security via Homomorphic Smooth Projective Hashing
- An Algebraic Framework for Diffie-Hellman Assumptions
- RKA Secure PKE Based on the DDH and HR Assumptions
- Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier
- Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter
- Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier
- Message Authentication, Revisited
- Public Key Encryption against Related Key Attacks
- Secure Message Authentication Against Related-Key Attack
- The Kernel Matrix Diffie-Hellman Assumption
- Cryptography Secure against Related-Key Attacks and Tampering
- The Group of Signed Quadratic Residues and Applications
- Related-Key Security for Hybrid Encryption
- Adaptive Trapdoor Functions and Chosen-Ciphertext Security
- Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks
- Secure Hybrid Encryption from Weakened Key Encapsulation
- A New Randomness Extraction Paradigm for Hybrid Encryption
- A Pseudorandom Generator from any One-way Function
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures
- Related Key Secure PKE from Hash Proof Systems
- Adaptive Partitioning
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Theory of Cryptography