Public Key Encryption against Related Key Attacks
From MaRDI portal
Publication:2900222
DOI10.1007/978-3-642-30057-8_16zbMath1290.94138OpenAlexW92989823MaRDI QIDQ2900222
Publication date: 20 July 2012
Published in: Public Key Cryptography – PKC 2012 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-30057-8_16
Related Items (27)
Relations between robustness and RKA security under public-key encryption ⋮ Non-malleable functions and their applications ⋮ Security Against Related Randomness Attacks via Reconstructive Extractors ⋮ Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system ⋮ Faster Gaussian sampling for trapdoor lattices with arbitrary modulus ⋮ Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks ⋮ Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions ⋮ The Chaining Lemma and Its Application ⋮ Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience ⋮ Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions ⋮ Secure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementation ⋮ A Generic Construction of Integrated Secure-Channel Free PEKS and PKE ⋮ Continuously non-malleable codes against bounded-depth tampering ⋮ Verifiable functional encryption using Intel SGX ⋮ Algebraic manipulation detection codes ⋮ How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks ⋮ Network Coding Signature Schemes Against Related-Key Attacks in the Random Oracle Model ⋮ Subversion-resilient signatures: definitions, constructions and applications ⋮ Bounded tamper resilience: how to go beyond the algebraic barrier ⋮ Related-key security for pseudorandom functions beyond the linear barrier ⋮ Non-malleable Codes with Split-State Refresh ⋮ Identity-based encryption with leakage-amplified chosen-ciphertext attacks security ⋮ Algebraic manipulation detection codes via highly nonlinear functions ⋮ Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman ⋮ Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions ⋮ Impossibility on tamper-resilient cryptography with uniqueness properties ⋮ Provably-Secure Remote Memory Attestation for Heap Overflow Protection
This page was built for publication: Public Key Encryption against Related Key Attacks