Targeted lossy functions and applications
From MaRDI portal
Publication:2139643
DOI10.1007/978-3-030-84259-8_15zbMath1489.94107OpenAlexW3184795902MaRDI QIDQ2139643
Daniel Wichs, Willy Quach, Brent Waters
Publication date: 18 May 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-84259-8_15
Related Items (2)
Cites Work
- Unnamed Item
- More constructions of lossy and correlation-secure trapdoor functions
- Extracting randomness from extractor-dependent sources
- Low error efficient computational extractors in the CRS model
- Incompressible encodings
- Chosen ciphertext security from injective trapdoor functions
- New techniques for efficient trapdoor functions and applications
- Selective Opening Security for Receivers
- The Magic of ELFs
- All-But-Many Lossy Trapdoor Functions
- Standard Security Does Not Imply Security against Selective-Opening
- Function Secret Sharing
- Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security
- Standard Security Does Not Imply Indistinguishability Under Selective Opening
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Lossy trapdoor functions and their applications
- Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
- Instantiability of RSA-OAEP under Chosen-Plaintext Attack
- On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
- Hedged Public-Key Encryption: How to Protect against Bad Randomness
- Leakage-Resilient Cryptography from Minimal Assumptions
- Witness Maps and Applications
- Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input, Revisited
- Distributed Point Functions and Their Applications
- Standard versus Selective Opening Security: Separation and Equivalence Results
- Public-Key Cryptosystems Resilient to Key Leakage
This page was built for publication: Targeted lossy functions and applications