Rate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacks
From MaRDI portal
Publication:2061928
DOI10.1007/978-3-030-75245-3_16zbMath1479.94206OpenAlexW3157347515MaRDI QIDQ2061928
Qiqi Lai, Feng-Hao Liu, Zhedong Wang
Publication date: 21 December 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-75245-3_16
Cites Work
- Unnamed Item
- Unnamed Item
- Advances in cryptology -- CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16--20, 2009. Proceedings
- Probabilistic encryption
- Anonymous IBE, leakage resilience and circular security from new assumptions
- Key dependent message security and receiver selective opening security for identity-based encryption
- Correlated-source extractors and cryptography with correlated-random tapes
- KDM-Security via Homomorphic Smooth Projective Hashing
- Learning with Rounding, Revisited
- Pseudorandom Functions and Lattices
- Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification
- Black-Box Circular-Secure Encryption beyond Affine Functions
- Key-Dependent Message Security: Generic Amplification and Completeness
- Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
- Public-Key Encryption in the Bounded-Retrieval Model
- Bounded Key-Dependent Message Security
- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
- Circular-Secure Encryption from Decision Diffie-Hellman
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Leakage-Resilient Cryptography from Minimal Assumptions
- On cryptography with auxiliary input
- Towards Key-Dependent Message Security in the Standard Model
- Information Security and Cryptology - ICISC 2003
- Soundness of Formal Encryption in the Presence of Key-Cycles
- Public-Key Cryptosystems Resilient to Key Leakage
This page was built for publication: Rate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacks