Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions
From MaRDI portal
Publication:2946437
DOI10.1007/978-3-319-22174-8_1zbMath1370.94513OpenAlexW1747263884MaRDI QIDQ2946437
Eiichiro Fujisaki, Keita Xagawa
Publication date: 17 September 2015
Published in: Progress in Cryptology -- LATINCRYPT 2015 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-22174-8_1
Related Items (6)
Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions ⋮ How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks ⋮ Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman ⋮ Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions ⋮ Impossibility on tamper-resilient cryptography with uniqueness properties ⋮ Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Advances in cryptology -- ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4--8, 2011. Proceedings
- Efficient selective identity-based encryption without random oracles
- Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15--19, 2010. Proceedings
- New types of cryptanalytic attacks using related keys
- RKA Secure PKE Based on the DDH and HR Assumptions
- Modern Computer Algebra
- Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier
- Public Key Encryption against Related Key Attacks
- Tamper and Leakage Resilience in the Split-State Model
- Continuous Non-malleable Key Derivation and Its Application to Related-Key Security
- Correlated-Input Secure Hash Functions
- On the Joint Security of Encryption and Signature, Revisited
- Cryptography Secure against Related-Key Attacks and Tampering
- BiTR: Built-in Tamper Resilience
- Efficient Chosen-Ciphertext Security via Extractable Hash Proofs
- Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks
- Non-Malleable Codes
- RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures
- Improved Constructions of PRFs Secure Against Related-Key Attacks
- Cryptography with Tamperable and Leaky Memory
- Related Key Secure PKE from Hash Proof Systems
- Non-malleable codes from additive combinatorics
- Tamper Detection and Continuous Non-malleable Codes
- Efficient Identity-Based Encryption Without Random Oracles
- Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Theory of Cryptography
- Theory of Cryptography
- On the importance of eliminating errors in cryptographic computations
This page was built for publication: Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions