Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Tightly CCA-Secure Encryption Without Pairings - MaRDI portal

Tightly CCA-Secure Encryption Without Pairings

From MaRDI portal
Publication:2820476

DOI10.1007/978-3-662-49890-3_1zbMath1347.94032OpenAlexW2464211838WikidataQ60220897 ScholiaQ60220897MaRDI QIDQ2820476

Eike Kiltz, Hoeteck Wee, Dennis Hofheinz, Romain Gay

Publication date: 9 September 2016

Published in: Advances in Cryptology – EUROCRYPT 2016 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-49890-3_1




Related Items (43)

Master-Key KDM-Secure IBE from PairingsHierarchical Identity-Based Encryption with Tight Multi-challenge SecurityAlmost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and MoreQuantum algorithms for the \(k\)-XOR problemAuthenticated key exchange and signatures with tight security in the standard modelTightness subtleties for multi-user PKE notionsSubversion-resistant quasi-adaptive NIZK and applications to modular zk-SNARKsUnbounded ABE via bilinear entropy expansion, revisitedMulti-designated receiver signed public key encryptionImproved, black-box, non-malleable encryption from semantic securityKey-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledgeDigital Signatures with Memory-Tight Security in the Multi-challenge SettingAlmost tightly-secure re-randomizable and replayable CCA-secure public key encryptionQANIZK for adversary-dependent languages and their applicationsEfficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge SettingDéjà Q All Over Again: Tighter and Broader Reductions of q-Type AssumptionsIterated Random Oracle: A Universal Approach for Finding Loss in Security ReductionAlmost tight multi-user security under adaptive corruptions \& leakages in the standard modelFine-grained verifier NIZK and its applicationsTight lower bounds and optimal constructions of anonymous broadcast encryption and authenticationThe Kernel Matrix Diffie-Hellman AssumptionMemory-tight multi-challenge security of public-key encryptionKey encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightnessIdentity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext settingUnbounded HIBE with tight securityTightly CCA-secure encryption scheme in a multi-user setting with corruptionsTowards tight adaptive security of non-interactive key exchangeImproved inner-product encryption with adaptive security and full attribute-hidingSimple and more efficient PRFs with tight security from LWE and matrix-DDHNew technique for chosen-ciphertext security based on non-interactive zero-knowledgeGeneralized public-key cryptography with tight securityTowards Tightly Secure Deterministic Public Key EncryptionTighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge SettingTightly secure inner product functional encryption: multi-input and function-hiding constructionsCompact structure-preserving signatures with almost tight securityMulti-input Inner-Product Functional Encryption from PairingsTightly secure hierarchical identity-based encryptionTightly CCA-secure inner product functional encryption schemeTightly-secure authenticated key exchange, revisitedIBE with tight security against selective opening and chosen-ciphertext attacksShort tightly secure signatures for signing a vector of group elements: a new approachShorter non-interactive zero-knowledge arguments and ZAPs for algebraic languagesAdaptive Partitioning




This page was built for publication: Tightly CCA-Secure Encryption Without Pairings