Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks - MaRDI portal

A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks

From MaRDI portal
Publication:3627444

DOI10.1007/978-3-642-01001-9_20zbMath1239.94038OpenAlexW2169265599MaRDI QIDQ3627444

Nishanth Chandran, Jan Camenisch, Victor Shoup

Publication date: 12 May 2009

Published in: Advances in Cryptology - EUROCRYPT 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-01001-9_20




Related Items (42)

The key-dependent message security of key-alternating Feistel ciphersMaster-Key KDM-Secure IBE from PairingsOn Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation SoundnessSignature schemes secure against hard-to-invert leakageTightly secure signatures and public-key encryptionThe KDM-CCA Security of REACTShort Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple AssumptionsOn black-box extension of a non-interactive zero-knowledge proof system for secret equalityNaor-Yung paradigm with shared randomness and applicationsCPA-to-CCA transformation for KDM securityRound-optimal password-based authenticated key exchangeQANIZK for adversary-dependent languages and their applicationsExtendable threshold ring signatures with enhanced anonymityEfficient KDM-CCA Secure Public-Key Encryption for Polynomial FunctionsConstruction of a key-dependent message secure symmetric encryption scheme in the ideal cipher modelStrongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard AssumptionsGeneric constructions of master-key KDM secure attribute-based encryptionShorter quasi-adaptive NIZK proofs for linear subspacesReproducible circularly secure bit encryption: applications and realizationsNon-interactive composition of sigma-protocols via Share-then-HashConstructions Secure Against Receiver Selective Opening and Chosen Ciphertext AttacksAdaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructionsKDM security for identity-based encryption: constructions and separationsBounded tamper resilience: how to go beyond the algebraic barrierAn algebraic framework for Diffie-Hellman assumptionsTagged One-Time Signatures: Tight Security and Optimal Tag SizeImproved Structure Preserving Signatures Under Standard Bilinear AssumptionsStructure-Preserving Chosen-Ciphertext Security with Shorter Verifiable CiphertextsEfficient Confirmer Signatures from the “Signature of a Commitment” ParadigmCompleteness of Single-Bit Projection-KDM Security for Public Key EncryptionFully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval modelNon-interactive Confirmer SignaturesKey-dependent message security: generic amplification and completenessA Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext AttacksKey-Dependent Message Security for Division Function: Discouraging Anonymous Credential SharingMaster-key KDM-secure ABE via predicate encodingNaor-Yung Paradigm with Shared Randomness and ApplicationsMemory Erasability AmplificationBounded KDM Security from iO and OWFEfficient fully structure-preserving signatures and shrinking commitmentsBlock-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient AttributesOn Symmetric Encryption and Point Obfuscation



Cites Work


This page was built for publication: A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks