On Symmetric Encryption and Point Obfuscation
From MaRDI portal
Publication:3408187
DOI10.1007/978-3-642-11799-2_4zbMath1274.94048OpenAlexW1509136851MaRDI QIDQ3408187
Ran Canetti, Yael Tauman Kalai, Mayank Varia, Daniel Wichs
Publication date: 24 February 2010
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-11799-2_4
Related Items (16)
Fiat-Shamir and correlation intractability from strong KDM-secure encryption ⋮ Unclonable polymers and their cryptographic applications ⋮ Lockable obfuscation from circularly insecure fully homomorphic encryption ⋮ On the obfuscatability of quantum point functions ⋮ Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES ⋮ Robust encryption ⋮ Reusable fuzzy extractors for low-entropy distributions ⋮ Contention in Cryptoland: Obfuscation, Leakage and UCE ⋮ Point-Function Obfuscation: A Framework and Generic Constructions ⋮ On strong simulation and composable point obfuscation ⋮ Security under message-derived keys: signcryption in iMessage ⋮ Secure Obfuscation of Encrypted Verifiable Encrypted Signatures ⋮ On Symmetric Encryption and Point Obfuscation ⋮ Obfuscation of Hyperplane Membership ⋮ A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation ⋮ IND-secure quantum symmetric encryption based on point obfuscation
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
- On Symmetric Encryption and Point Obfuscation
- On obfuscating point functions
- Circular-Secure Encryption from Decision Diffie-Hellman
- OAEP Is Secure under Key-Dependent Messages
- On the (Im)Possibility of Key Dependent Encryption
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
- Signature Schemes with Bounded Leakage Resilience
- On cryptography with auxiliary input
- Advances in Cryptology - EUROCRYPT 2004
- Towards Key-Dependent Message Security in the Standard Model
- Obfuscating Point Functions with Multibit Output
- Public-Key Cryptosystems Resilient to Key Leakage
- Theory of Cryptography
This page was built for publication: On Symmetric Encryption and Point Obfuscation