Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy - MaRDI portal

A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy

From MaRDI portal
Publication:2891507

DOI10.1007/978-3-642-28914-9_33zbMath1296.94111OpenAlexW2119718174MaRDI QIDQ2891507

Adam O'Neill, Leonid Reyzin, Benjamin Fuller

Publication date: 15 June 2012

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-28914-9_33




Related Items (20)

Toward RSA-OAEP Without Random OraclesPseudoentropy: Lower-Bounds for Chain Rules and TransformationsApproximate-Deterministic Public Key Encryption from Hard Learning ProblemsReproducible Circularly-Secure Bit Encryption: Applications and RealizationsA counterexample to the chain rule for conditional HILL entropyEfficient Code Based Hybrid and Deterministic Encryptions in the Standard ModelThe Chain Rule for HILL Pseudoentropy, RevisitedMetric Pseudoentropy: Characterizations, Transformations and ApplicationsNonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to PseudoentropyA Better Chain Rule for HILL Pseudoentropy - Beyond Bounded LeakageSecure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementationInstantiability of classical random-oracle-model encryption transformsIncremental deterministic public-key encryptionDeterministic public-key encryption for adaptively-chosen plaintext distributionsFunctional Encryption: Deterministic to Randomized Functions from Simple AssumptionsA generic construction of CCA-secure deterministic encryptionA unified approach to deterministic encryption: new constructions and a connection to computational entropyBetter security for deterministic public-key encryption: the auxiliary-input settingDeterministic Public-Key Encryption Under Continual LeakageOn selective-opening security of deterministic primitives




This page was built for publication: A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy