Practical public key encryption with selective opening security for receivers
From MaRDI portal
Publication:2004703
DOI10.1016/J.INS.2018.10.055zbMath1443.68052OpenAlexW2900006499WikidataQ120855451 ScholiaQ120855451MaRDI QIDQ2004703
Liaoliang Jiang, Junzuo Lai, Zhengan Huang, Wenbin Chen, Muhammad Raees-Ul-haq
Publication date: 7 October 2020
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2018.10.055
Related Items (2)
Constant-round authenticated and dynamic group key agreement protocol for D2D group communications ⋮ A key-sharing based secure deduplication scheme in cloud storage
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Lattice-based linearly homomorphic signatures in the standard model
- Insight of the protection for data security under selective opening attacks
- All-but-many lossy trapdoor functions from lattices and applications
- All-but-many lossy trapdoor functions and selective opening chosen-ciphertext security from LWE
- Tightly SIM-SO-CCA secure public key encryption from standard assumptions
- Privacy-preserving naive Bayes classifiers secure against the substitution-then-comparison attack
- Differentially private naive Bayes learning over multiple data sources
- Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
- Non-malleability Under Selective Opening Attacks: Implication and Separation
- Selective Opening Security for Receivers
- All-But-Many Lossy Trapdoor Functions
- Standard Security Does Not Imply Security against Selective-Opening
- On Definitions of Selective Opening Security
- Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms
- On the Selective Opening Security of Practical Public-Key Encryption Schemes
- Selective Opening Security from Simulatable Data Encapsulation
- Selective-Opening Security in the Presence of Randomness Failures
- Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks
- Identity-Based Encryption with Outsourced Revocation in Cloud Computing
- Verifiable Computation over Large Database with Incremental Updates
- Identity-Based Encryption Secure against Selective Opening Attack
- Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security
- Standard Security Does Not Imply Indistinguishability Under Selective Opening
- Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts
- Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited
- Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
- Theory of Cryptography
- Standard versus Selective Opening Security: Separation and Equivalence Results
This page was built for publication: Practical public key encryption with selective opening security for receivers