Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
From MaRDI portal
Publication:4441904
DOI10.1137/S0097539702403773zbMath1045.94013WikidataQ60162890 ScholiaQ60162890MaRDI QIDQ4441904
Publication date: 8 January 2004
Published in: SIAM Journal on Computing (Search for Journal in Brave)
Related Items
Memory-Tight Reductions for Practical Key Encapsulation Mechanisms, The ECCA Security of Hybrid Encryptions, Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions, (Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond, Basics of Secrecy Coding, Improved Identity-Based Online/Offline Encryption, Watermarking Cryptographic Capabilities, Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model, On the Impossibility of Strong Encryption Over $\aleph_0$, Authenticated Key Exchange and Key Encapsulation in the Standard Model, A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs, Gladius: LWR Based Efficient Hybrid Public Key Encryption with Distributed Decryption, Sender-binding key encapsulation, Let attackers program ideal models: modularity and composability for adaptive compromise, Multi-instance secure public-key encryption, Post-quantum anonymity of Kyber, QCCA-secure generic transformations in the quantum random oracle model, A more complete analysis of the signal double ratchet algorithm, A construction of encryption protocols over some semidirect products, Offline Assisted Group Key Exchange, A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Implementation, A new security notion for PKC in the standard model: weaker, simpler, and still realizing secure channels, Rate-1 incompressible encryption from standard assumptions, A Brief History of Provably-Secure Public-Key Encryption, Generic Constructions of Stateful Public Key Encryption and Their Applications, Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext, Memory-tight multi-challenge security of public-key encryption, On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model, Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates, Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness, Post-quantum anonymous one-sided authenticated key exchange without random oracles, A code-based hybrid signcryption scheme, Improved proxy re-encryption schemes with applications to secure distributed storage, Efficient non-malleable commitment schemes, Non-Interactive Key Exchange, Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited, Robust Encryption, Revisited, New Constructions and Applications of Trapdoor DDH Groups, Efficient Certificateless KEM in the Standard Model, Efficient Implementation of Hybrid Encryption from Coding Theory, Efficient non-malleable commitment schemes, The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model, A Modular Security Analysis of the TLS Handshake Protocol, Chosen Ciphertext Security with Optimal Ciphertext Overhead, Another look at automated theorem-proving, Faster and Shorter Password-Authenticated Key Exchange, Efficient KEMs with Partial Message Recovery, On the Connection Between Signcryption and One-Pass Key Establishment, Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation, On the Anonymity of Multi-Receiver Identity-Based Encryption Based on Fujisaki–Okamoto Transformation, Scalable public-key tracing and revoking, The Twin Diffie-Hellman Problem and Applications, CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption, Universally Anonymous IBE Based on the Quadratic Residuosity Assumption, Practical Chosen Ciphertext Secure Encryption from Factoring, A New Randomness Extraction Paradigm for Hybrid Encryption, Multi-recipient Public-Key Encryption from Simulators in Security Proofs, Security on Hybrid Encryption with the Tag-KEM/DEM Framework, Anonymity from Public Key Encryption to Undeniable Signatures, Efficient chosen ciphertext secure key encapsulation mechanism in standard model over ideal lattices, A Three-Property-Secure Hash Function, Provably secure Rabin-p cryptosystem in hybrid setting, How to Use Indistinguishability Obfuscation: Deniable Encryption, and More, A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems, Robust Encryption, Unnamed Item, Hybrid Damgård Is CCA1-Secure under the DDH Assumption, Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem, A CCA Secure Hybrid Damgård’s ElGamal Encryption, On the Construction of Public Key Encryption with Sender Recovery, Cryptanalysis of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family, A Public-Key Encryption Scheme with Pseudo-random Ciphertexts, Adaptive Partitioning, An efficient IBE scheme with tight security reduction in the random oracle model, Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing, Tight chosen ciphertext attack (CCA)-secure hybrid encryption scheme with full public verifiability, On the Joint Security of Encryption and Signature in EMV, Polly cracker, revisited, Towards post-quantum security for signal's X3DH handshake, Certifying trapdoor permutations, revisited, Short variable length domain extenders with beyond birthday bound security, Quantum lattice enumeration and tweaking discrete pruning, LWE without modular reduction and improved side-channel attacks against BLISS, CRT-Based Outsourcing Algorithms for Modular Exponentiations, The multi-base discrete logarithm problem: tight reductions and non-rewinding proofs for Schnorr identification and signatures, Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system, An efficient post-quantum KEM from CSIDH, Compact proofs of retrievability, Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message, A survey on delegated computation, Tightly secure ring-LWE based key encapsulation with short ciphertexts, Anonymity of NIST PQC round 3 KEMs, Improved, black-box, non-malleable encryption from semantic security, Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing, Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression, A generic construction of tightly secure signatures in the multi-user setting, Selective Opening Security from Simulatable Data Encapsulation, A post-quantum hybrid encryption based on QC-LDPC codes in the multi-user setting, Two-server password-only authenticated key exchange, Generic constructions of identity-based and certificateless kEMs, Wildcarded identity-based encryption, Practical chosen ciphertext secure encryption from factoring, Secure integration of asymmetric and symmetric encryption schemes, Scalable ciphertext compression techniques for post-quantum KEMs and their applications, Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks, State separation for code-based game-playing proofs, Towards practical key exchange from ordinary isogeny graphs, Robustly reusable fuzzy extractor from standard assumptions, Possibility and impossibility results for selective decommitments, Security models and proof strategies for plaintext-aware encryption, How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks, Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation, New technique for chosen-ciphertext security based on non-interactive zero-knowledge, On the impossibility of structure-preserving deterministic primitives, Lossy Key Encapsulation Mechanism and Its Applications, Efficient public key encryption with equality test in the standard model, Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts, Hybrid Signcryption, Key Establishment Using Signcryption Techniques, Strongly secure authenticated key exchange from factoring, codes, and lattices, Secure public-key encryption scheme without random oracles, Certificateless threshold cryptosystem secure against chosen-ciphertext attack, Security Notions for Broadcast Encryption, Identification Schemes from Key Encapsulation Mechanisms, HILA5: on reliability, reconciliation, and error correction for Ring LWE encryption, All-but-many encryption, An algebraic framework for Diffie-Hellman assumptions, New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem, Robust encryption, DAGS: key encapsulation using dyadic GS codes, Tag-KEM/DEM: A new framework for hybrid encryption, Practical public key encryption with selective opening security for receivers, Lower bounds for non-black-box zero knowledge, A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack, The TLS handshake protocol: A modular analysis, Efficient hybrid encryption from ID-based encryption, Some (in)sufficient conditions for secure hybrid encryption, Efficient chosen-ciphertext secure certificateless threshold key encapsulation mechanism, Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed?, Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption, Delegating a product of group exponentiations with application to signature schemes, The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure, Improved efficiency of Kiltz07-KEM, Non-malleability Under Selective Opening Attacks: Implication and Separation, A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system, Optimal Computational Split-state Non-malleable Codes, Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures, A New Rabin-type Trapdoor Permutation Equivalent to Factoring, On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes, Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman, CCA-security from adaptive all-but-one lossy trapdoor functions, Compact designated verifier NIZKs from the CDH assumption without pairings, Secure and Traceable Framework for Data Circulation, Generic authenticated key exchange in the quantum random oracle model, Analysing the HPKE standard, Efficient Identity-Based Signcryption in the Standard Model, QCCA-secure generic key encapsulation mechanism with tighter security in the quantum random oracle model, Impossibility on tamper-resilient cryptography with uniqueness properties, Constructing Secure Hybrid Encryption from Key Encapsulation Mechanism with Authenticity, Big-Key Symmetric Encryption: Resisting Key Exfiltration, Direct chosen-ciphertext secure identity-based key encapsulation without random oracles, The twin Diffie-Hellman problem and applications, Insight of the protection for data security under selective opening attacks, CCA secure encryption supporting authorized equality test on ciphertexts in standard model and its applications, Public key encryption with equality test via hash proof system, A new cryptosystem based on a twisted Hessian curve \(H^4_{a,d}\), Signcryption with non-interactive non-repudiation, Privacy-preserving encryption scheme using DNA parentage test, Towards witness encryption without multilinear maps, Secure hybrid encryption in the standard model from hard learning problems, Separate your domains: NIST PQC KEMs, oracle cloning and read-only indifferentiability, On the memory-tightness of hashed ElGamal, Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model