Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security - MaRDI portal

Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security

From MaRDI portal
Publication:3102176

DOI10.1007/978-3-642-25385-0_4zbMath1227.94048OpenAlexW2102090397MaRDI QIDQ3102176

Benoît Libert, Brett Hemenway, Damien Vergnaud, Rafail Ostrovsky

Publication date: 2 December 2011

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-25385-0_4




Related Items (32)

SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functionsTargeted lossy functions and applicationsReceiver Selective Opening Security from Indistinguishability ObfuscationShort Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple AssumptionsStandard Security Does Not Imply Indistinguishability Under Selective OpeningPublic-Key Encryption with Simulation-Based Selective-Opening Security and Compact CiphertextsRegular lossy functions and their applications in leakage-resilient cryptographyFully leakage-resilient signaturesOne-shot Fiat-Shamir-based NIZK arguments of composite residuosity and logarithmic-size ring signatures in the standard modelRational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard ModelSimulation-based selective opening security for receivers under chosen-ciphertext attacksDéjà Q All Over Again: Tighter and Broader Reductions of q-Type AssumptionsCumulatively all-lossy-but-one trapdoor functions from standard assumptionsCompact and tightly selective-opening secure public-key encryption schemesSimulation-based bi-selective opening security for public key encryptionNon-interactive zero-knowledge from non-interactive batch argumentsPossibility and impossibility results for receiver selective opening secure PKE in the multi-challenge settingSimpler statistically sender private oblivious transfer from ideals of cyclotomic integersReceiver selective opening security for identity-based encryption in the multi-challenge settingConstructions Secure Against Receiver Selective Opening and Chosen Ciphertext AttacksLossy Key Encapsulation Mechanism and Its ApplicationsTowards Tightly Secure Deterministic Public Key EncryptionThe polynomial approximate common divisor problem and its application to the fully homomorphic encryptionSender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks RevisitedPractical public key encryption with selective opening security for receiversOn the Exact Round Complexity of Self-composable Two-Party ComputationNon-malleability Under Selective Opening Attacks: Implication and SeparationCCA-security from adaptive all-but-one lossy trapdoor functionsSender-equivocable encryption schemes secure against chosen-ciphertext attacks revisitedDeterministic Public-Key Encryption Under Continual LeakageBackdoors in Pseudorandom Number Generators: Possibility and Impossibility ResultsIBE with tight security against selective opening and chosen-ciphertext attacks






This page was built for publication: Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security