Receiver selective opening security for identity-based encryption in the multi-challenge setting
From MaRDI portal
Publication:2697475
DOI10.1007/s10623-022-01147-8OpenAlexW4309235746WikidataQ122228521 ScholiaQ122228521MaRDI QIDQ2697475
Gongxian Zeng, Xin Mu, Zhengan Huang, Junzuo Lai
Publication date: 12 April 2023
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-022-01147-8
Cites Work
- Unnamed Item
- IBE with tight security against selective opening and chosen-ciphertext attacks
- SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions
- All-but-many lossy trapdoor functions from lattices and applications
- All-but-many lossy trapdoor functions and selective opening chosen-ciphertext security from LWE
- Key dependent message security and receiver selective opening security for identity-based encryption
- Tightly SIM-SO-CCA secure public key encryption from standard assumptions
- Secure integration of asymmetric and symmetric encryption schemes
- Noninteractive zero knowledge for NP from (Plain) Learning With Errors
- Simulation-based selective opening security for receivers under chosen-ciphertext attacks
- Receiver selective opening CCA secure public key encryption from various assumptions
- Possibility and impossibility results for receiver selective opening secure PKE in the multi-challenge setting
- Non-malleability Under Selective Opening Attacks: Implication and Separation
- Selective Opening Security for Receivers
- All-But-Many Lossy Trapdoor Functions
- Standard Security Does Not Imply Security against Selective-Opening
- Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms
- On the Selective Opening Security of Practical Public-Key Encryption Schemes
- Selective Opening Security from Simulatable Data Encapsulation
- Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks
- Identity-Based Encryption Secure against Selective Opening Attack
- Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security
- Receiver Selective Opening Security from Indistinguishability Obfuscation
- Standard Security Does Not Imply Indistinguishability Under Selective Opening
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
- Efficient Lattice (H)IBE in the Standard Model
- Perfect Non-interactive Zero Knowledge for NP
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited
- Secure integration of asymmetric and symmetric encryption schemes
- Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
- Standard versus Selective Opening Security: Separation and Equivalence Results
- Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
- Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions
- Simulation-based bi-selective opening security for public key encryption
This page was built for publication: Receiver selective opening security for identity-based encryption in the multi-challenge setting