Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article - MaRDI portal

scientific article

From MaRDI portal
Publication:3374913

zbMath1082.94504MaRDI QIDQ3374913

Alexandra Boldyreva, Silvio Micali, Mihir Bellare

Publication date: 1 March 2006


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (75)

Another Look at TightnessGeneric Construction of Chosen Ciphertext Secure Proxy Re-EncryptionMemory-Tight Reductions for Practical Key Encapsulation MechanismsBringing Order to Chaos: The Case of Collision-Resistant Chameleon-HashesRevisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user settingTightly secure signatures and public-key encryptionShort variable length domain extenders with beyond birthday bound securityMore efficient DDH pseudorandom generatorsTightness subtleties for multi-user PKE notionsRevisiting AES-GCM-SIV: multi-user security, faster key derivation, and better boundsSomewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryptionMulti-designated receiver signed public key encryptionCryptHOL: game-based proofs in higher-order logicConnecting tweakable and multi-key blockcipher securityDigital Signatures with Memory-Tight Security in the Multi-challenge SettingAlmost tightly-secure re-randomizable and replayable CCA-secure public key encryptionAlmost tight multi-user security under adaptive corruptions \& leakages in the standard modelMulti-instance secure public-key encryptionCCA2-Secure Threshold Broadcast Encryption with Shorter CiphertextsA post-quantum hybrid encryption based on QC-LDPC codes in the multi-user settingKDM security for the Fujisaki-Okamoto transformations in the QROMLattice-based signatures with tight adaptive corruptions and moreSalvaging Weak Security Bounds for Blockcipher-Based ConstructionsPuncturable key wrapping and its applicationsA modular approach to the security analysis of two-permutation constructionsAuthenticated encryption with key identificationMemory-tight multi-challenge security of public-key encryptionSimulation-based bi-selective opening security for public key encryptionLuby-Rackoff backwards with more users and more securityIdentity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext settingCCA-secure (puncturable) KEMs from encryption with non-negligible decryption errorsScalable ciphertext compression techniques for post-quantum KEMs and their applicationsOn the adaptive security of MACs and PRFsTightly CCA-secure encryption scheme in a multi-user setting with corruptionsAdaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructionsNon-malleable encryption: simpler, shorter, strongerState separation for code-based game-playing proofsSharing many secrets with computational provable securityEfficient certificateless anonymous multi-receiver encryption scheme without bilinear paringsIdentity-Based Broadcast Encryption with Constant Size Ciphertexts and Private KeysGeneralized public-key cryptography with tight securityTowards Tightly Secure Deterministic Public Key EncryptionTighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge SettingSigncryption Schemes Based on the Diffie–Hellman ProblemPublic key encryption with filtered equality test revisitedTightly secure inner product functional encryption: multi-input and function-hiding constructionsCompact structure-preserving signatures with almost tight securityThe Multi-user Security of Double EncryptionAutomating Computational Proofs for Public-Key-Based Key ExchangeSubtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed?Deterministic Encryption: Definitional Equivalences and Constructions without Random OraclesCompleteness of Single-Bit Projection-KDM Security for Public Key EncryptionAlgebraic Partitioning: Fully Compact and (almost) Tightly Secure CryptographyNon-Malleable Encryption: Simpler, Shorter, StrongerTweaking a block cipher: multi-user beyond-birthday-bound security in the standard modelStrengthening Security of RSA-OAEPA Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext AttacksComputational Semantics for First-Order Logical Analysis of Cryptographic ProtocolsEverybody's a target: scalability in public-key encryptionTightly-secure authenticated key exchange, revisitedCertified Encryption RevisitedMore efficient digital signatures with tight multi-user securityKey-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user SecurityThe Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3Multi-user BBB security of public permutations based MACEfficient and Provably Secure Certificateless Multi-receiver SigncryptionHandling adaptive compromise for practical encryption schemesBetter concrete security for half-gates garbling (in the multi-instance setting)Efficient and tight oblivious transfer from PKE with tight multi-user securityPublic key signatures in the multi-user setting.Quantum generic attacks on key-alternating Feistel ciphers for shorter keysAd-Hoc Threshold Broadcast Encryption with Shorter CiphertextsComputational Soundness of Symbolic Analysis for Protocols Using Hash FunctionsAdaptive PartitioningShort identity-based signatures with tight security from lattices




This page was built for publication: