Relations between robustness and RKA security under public-key encryption
From MaRDI portal
Publication:266278
DOI10.1016/j.tcs.2016.03.015zbMath1394.94929OpenAlexW2298253829WikidataQ115036525 ScholiaQ115036525MaRDI QIDQ266278
Publication date: 13 April 2016
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2016.03.015
Related Items (2)
Robust digital signature revisited ⋮ Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Probabilistic encryption
- Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
- Public Key Encryption against Related Key Attacks
- A Closer Look at Anonymity and Robustness in Encryption Schemes
- Cryptography Secure against Related-Key Attacks and Tampering
- Robust Encryption
- Privacy in Encrypted Content Distribution Using Private Broadcast Encryption
- A method for obtaining digital signatures and public-key cryptosystems
- RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures
- Robust Encryption, Revisited
- Advances in Cryptology - EUROCRYPT 2004
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Fast Software Encryption
This page was built for publication: Relations between robustness and RKA security under public-key encryption