Dual Projective Hashing and Its Applications — Lossy Trapdoor Functions and More
From MaRDI portal
Publication:2894411
DOI10.1007/978-3-642-29011-4_16zbMath1297.94109OpenAlexW39687211MaRDI QIDQ2894411
Publication date: 29 June 2012
Published in: Advances in Cryptology – EUROCRYPT 2012 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-29011-4_16
Related Items (22)
Approximate-Deterministic Public Key Encryption from Hard Learning Problems ⋮ Reproducible Circularly-Secure Bit Encryption: Applications and Realizations ⋮ Regular lossy functions and their applications in leakage-resilient cryptography ⋮ Efficient cryptosystems from \(2^k\)-th power residue symbols ⋮ Improved, black-box, non-malleable encryption from semantic security ⋮ Updatable all-but-one dual projective hashing and its applications ⋮ Cumulatively all-lossy-but-one trapdoor functions from standard assumptions ⋮ Reproducible circularly secure bit encryption: applications and realizations ⋮ Lattice-based e-cash, revisited ⋮ Lossy Key Encapsulation Mechanism and Its Applications ⋮ Towards Tightly Secure Deterministic Public Key Encryption ⋮ Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification ⋮ Incremental deterministic public-key encryption ⋮ Deterministic public-key encryption for adaptively-chosen plaintext distributions ⋮ Removing Erasures with Explainable Hash Proof Systems ⋮ A generic construction of CCA-secure deterministic encryption ⋮ Point-Function Obfuscation: A Framework and Generic Constructions ⋮ A unified approach to deterministic encryption: new constructions and a connection to computational entropy ⋮ Better security for deterministic public-key encryption: the auxiliary-input setting ⋮ CCA-security from adaptive all-but-one lossy trapdoor functions ⋮ Deterministic Public-Key Encryption Under Continual Leakage ⋮ Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings
This page was built for publication: Dual Projective Hashing and Its Applications — Lossy Trapdoor Functions and More