A generic construction of CCA-secure deterministic encryption
From MaRDI portal
Publication:2011031
DOI10.1016/J.IPL.2019.105865zbMath1468.94401OpenAlexW2982218185WikidataQ122178315 ScholiaQ122178315MaRDI QIDQ2011031
Publication date: 28 November 2019
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ipl.2019.105865
cryptographychosen ciphertext securitydeterministic public-key encryptiondeterministic identity-based encryption(hierarchical) identity-based lossy trapdoor functions
Related Items (2)
Updatable all-but-one dual projective hashing and its applications ⋮ CCA-security from adaptive all-but-one lossy trapdoor functions
Cites Work
- Unnamed Item
- Hedging public-key encryption in the real world
- Hedged nonce-based public-key encryption: adaptive security under randomness failures
- Deterministic identity-based encryption from lattices with more compact public parameters
- Deterministic Public-Key Encryption Under Continual Leakage
- A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy
- Identity-Based (Lossy) Trapdoor Functions and Applications
- Dual Projective Hashing and Its Applications — Lossy Trapdoor Functions and More
- Incremental Deterministic Public-Key Encryption
- Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting
- How Secure is Deterministic Encryption?
- Resisting Randomness Subversion: Fast Deterministic and Hedged Public-Key Encryption in the Standard Model
- Lossy trapdoor functions and their applications
- On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
- Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles
- Deterministic and Efficiently Searchable Encryption
- Hedged Public-Key Encryption: How to Protect against Bad Randomness
- Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE
- Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions
- All-but-One Dual Projective Hashing and Its Applications
- Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Identity-Based Lossy Trapdoor Functions: New Definitions, Hierarchical Extensions, and Implications
This page was built for publication: A generic construction of CCA-secure deterministic encryption