New Circular Security Counterexamples from Decision Linear and Learning with Errors
From MaRDI portal
Publication:2796000
DOI10.1007/978-3-662-48800-3_32zbMath1382.94069OpenAlexW2294231544MaRDI QIDQ2796000
Allison Bishop, Susan Hohenberger, Brent Waters
Publication date: 23 March 2016
Published in: Advances in Cryptology – ASIACRYPT 2015 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-48800-3_32
Related Items (9)
Counterexamples to new circular security assumptions underlying iO ⋮ Universal amplification of KDM security: from 1-key circular to multi-key KDM ⋮ Lockable obfuscation from circularly insecure fully homomorphic encryption ⋮ KDM security for identity-based encryption: constructions and separations ⋮ Separating IND-CPA and Circular Security for Unbounded Length Key Cycles ⋮ Three’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE ⋮ Circular Security Separations for Arbitrary Length Cycles from LWE ⋮ Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption ⋮ Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions
This page was built for publication: New Circular Security Counterexamples from Decision Linear and Learning with Errors