Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks
From MaRDI portal
Publication:2975822
DOI10.1007/978-3-319-52153-4_24zbMath1383.94024OpenAlexW2591783875MaRDI QIDQ2975822
Xianhui Lu, Dingding Jia, Bao Li
Publication date: 12 April 2017
Published in: Topics in Cryptology – CT-RSA 2017 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-52153-4_24
Related Items (9)
SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions ⋮ Simulation-based selective opening security for receivers under chosen-ciphertext attacks ⋮ Anonymous public key encryption under corruptions ⋮ Simulation-based bi-selective opening security for public key encryption ⋮ Possibility and impossibility results for receiver selective opening secure PKE in the multi-challenge setting ⋮ Receiver selective opening security for identity-based encryption in the multi-challenge setting ⋮ Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks ⋮ Practical public key encryption with selective opening security for receivers ⋮ Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Standard Security Does Imply Security Against Selective Opening for Markov Distributions
- Selective Opening Security for Receivers
- Standard Security Does Not Imply Security against Selective-Opening
- On Definitions of Selective Opening Security
- On Selective-Opening Attacks against Encryption Schemes
- Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms
- On the Selective Opening Security of Practical Public-Key Encryption Schemes
- Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks
- Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security
- Standard Security Does Not Imply Indistinguishability Under Selective Opening
- Magic Functions
- Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
- A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
- A New Randomness Extraction Paradigm for Hybrid Encryption
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Leakage-Resilient Cryptography from Minimal Assumptions
- Advances in Cryptology – CRYPTO 2004
- Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
- Efficient Non-interactive Proof Systems for Bilinear Groups
- Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
- Theory of Cryptography
- Standard versus Selective Opening Security: Separation and Equivalence Results
This page was built for publication: Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks