RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures
From MaRDI portal
Publication:4911594
DOI10.1007/978-3-642-34961-4_21zbMath1292.94028OpenAlexW1624528701MaRDI QIDQ4911594
Susan Thomson, Mihir Bellare, Kenneth G. Paterson
Publication date: 19 March 2013
Published in: Advances in Cryptology – ASIACRYPT 2012 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-34961-4_21
Related Items (23)
Relations between robustness and RKA security under public-key encryption ⋮ Non-malleable functions and their applications ⋮ Public-Key Puncturable Encryption: Modular and Compact Constructions ⋮ Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system ⋮ Public key encryption resilient to leakage and tampering attacks ⋮ Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks ⋮ Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions ⋮ The Chaining Lemma and Its Application ⋮ Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge ⋮ Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience ⋮ Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions ⋮ Practical non-malleable codes from symmetric-key primitives in 2-split-state model ⋮ Continuously non-malleable codes against bounded-depth tampering ⋮ Continuously non-malleable codes in the split-state model ⋮ How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks ⋮ Bounded tamper resilience: how to go beyond the algebraic barrier ⋮ Related-key security for pseudorandom functions beyond the linear barrier ⋮ Non-malleable Codes with Split-State Refresh ⋮ Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman ⋮ Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions ⋮ Impossibility on tamper-resilient cryptography with uniqueness properties ⋮ Provably-Secure Remote Memory Attestation for Heap Overflow Protection ⋮ Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE
This page was built for publication: RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures