On the CCA compatibility of public-key infrastructure
From MaRDI portal
Publication:2061956
DOI10.1007/978-3-030-75248-4_9zbMath1479.94200OpenAlexW3158633952MaRDI QIDQ2061956
Dakshita Khurana, Brent Waters
Publication date: 21 December 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-75248-4_9
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unprovable security of perfect NIZK and non-interactive non-malleable commitments
- Probabilistic encryption
- Advances in cryptology - CRYPTO '98. 18th annual international cryptology conference, Santa Barbara, CA, USA, August 23--27, 1998. Proceedings
- One-message zero knowledge and non-malleable commitments
- Multi-collision resistant hash functions and their applications
- Collision resistant hashing for paranoids: dealing with multiple collisions
- Advances in cryptology -- EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 -- May 3, 2018. Proceedings. Part I
- Secure integration of asymmetric and symmetric encryption schemes
- Black-box non-interactive non-malleable commitments
- Advances in cryptology -- CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18--22, 2019. Proceedings. Part II
- Non-interactive non-malleability from quantum supremacy
- Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption
- Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions
- Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing
- Nonmalleable Cryptography
- Two-Round and Non-Interactive Concurrent Non-Malleable Commitments from Time-Lock Puzzles
- Multi-collision resistance: a paradigm for keyless hash functions
- Witness encryption and its applications
- CCA security and trapdoor functions via key-dependent-message security
This page was built for publication: On the CCA compatibility of public-key infrastructure