Cryptographic Agility and Its Relation to Circular Encryption
From MaRDI portal
Publication:3563847
DOI10.1007/978-3-642-13190-5_21zbMath1280.94034OpenAlexW2157332203MaRDI QIDQ3563847
Mihir Bellare, David Cash, Tolga Acar, Mira Belenkiy
Publication date: 1 June 2010
Published in: Advances in Cryptology – EUROCRYPT 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-13190-5_21
Related Items (12)
Counterexamples to new circular security assumptions underlying iO ⋮ A Quasipolynomial Reduction for Generalized Selective Decryption on Trees ⋮ Universal amplification of KDM security: from 1-key circular to multi-key KDM ⋮ Lockable obfuscation from circularly insecure fully homomorphic encryption ⋮ Circular security is complete for KDM security ⋮ KDM security for identity-based encryption: constructions and separations ⋮ Separating IND-CPA and Circular Security for Unbounded Length Key Cycles ⋮ Key-dependent message security: generic amplification and completeness ⋮ Master-key KDM-secure ABE via predicate encoding ⋮ Three’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE ⋮ Circular Security Separations for Arbitrary Length Cycles from LWE ⋮ Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption
This page was built for publication: Cryptographic Agility and Its Relation to Circular Encryption