New Definitions and Separations for Circular Security
From MaRDI portal
Publication:2900241
DOI10.1007/978-3-642-30057-8_32zbMath1300.94044OpenAlexW12398441MaRDI QIDQ2900241
No author found.
Publication date: 20 July 2012
Published in: Public Key Cryptography – PKC 2012 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-30057-8_32
Related Items (14)
Counterexamples to new circular security assumptions underlying iO ⋮ The KDM-CCA Security of REACT ⋮ Achievable \textsf{CCA2} relaxation for homomorphic encryption ⋮ Universal amplification of KDM security: from 1-key circular to multi-key KDM ⋮ Lockable obfuscation from circularly insecure fully homomorphic encryption ⋮ Circular security is complete for KDM security ⋮ KDM security for identity-based encryption: constructions and separations ⋮ Separating IND-CPA and Circular Security for Unbounded Length Key Cycles ⋮ Master-key KDM-secure ABE via predicate encoding ⋮ Three’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE ⋮ Circular Security Separations for Arbitrary Length Cycles from LWE ⋮ Homomorphic Encryption ⋮ Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption ⋮ Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions
This page was built for publication: New Definitions and Separations for Circular Security