Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Dual Projective Hashing and Its Applications — Lossy Trapdoor Functions and More - MaRDI portal

Dual Projective Hashing and Its Applications — Lossy Trapdoor Functions and More

From MaRDI portal
Publication:2894411

DOI10.1007/978-3-642-29011-4_16zbMath1297.94109OpenAlexW39687211MaRDI QIDQ2894411

Hoeteck Wee

Publication date: 29 June 2012

Published in: Advances in Cryptology – EUROCRYPT 2012 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-29011-4_16




Related Items (22)

Approximate-Deterministic Public Key Encryption from Hard Learning ProblemsReproducible Circularly-Secure Bit Encryption: Applications and RealizationsRegular lossy functions and their applications in leakage-resilient cryptographyEfficient cryptosystems from \(2^k\)-th power residue symbolsImproved, black-box, non-malleable encryption from semantic securityUpdatable all-but-one dual projective hashing and its applicationsCumulatively all-lossy-but-one trapdoor functions from standard assumptionsReproducible circularly secure bit encryption: applications and realizationsLattice-based e-cash, revisitedLossy Key Encapsulation Mechanism and Its ApplicationsTowards Tightly Secure Deterministic Public Key EncryptionExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationIncremental deterministic public-key encryptionDeterministic public-key encryption for adaptively-chosen plaintext distributionsRemoving Erasures with Explainable Hash Proof SystemsA generic construction of CCA-secure deterministic encryptionPoint-Function Obfuscation: A Framework and Generic ConstructionsA unified approach to deterministic encryption: new constructions and a connection to computational entropyBetter security for deterministic public-key encryption: the auxiliary-input settingCCA-security from adaptive all-but-one lossy trapdoor functionsDeterministic Public-Key Encryption Under Continual LeakageNon-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings




This page was built for publication: Dual Projective Hashing and Its Applications — Lossy Trapdoor Functions and More