Advances in Cryptology - EUROCRYPT 2004

From MaRDI portal
Publication:5307263

DOI10.1007/b97182zbMath1122.94369OpenAlexW2477185671WikidataQ21683979 ScholiaQ21683979MaRDI QIDQ5307263

Cynthia Dwork, Omer Reingold, Moni Naor

Publication date: 25 September 2007

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b97182




Related Items (22)

The Journey from NP to TFNP HardnessSimultaneous Secrecy and Reliability Amplification for a General Channel ModelA note on perfect correctness by derandomizationStatistical difference beyond the polarizing regimeCollision-resistance from multi-collision-resistancePublic-key encryption from homogeneous CLWECCA-secure (puncturable) KEMs from encryption with non-negligible decryption errorsNon-committing encryption with constant ciphertext expansion from standard assumptionsComputational Two-Party Correlation: A Dichotomy for Key-Agreement ProtocolsA black-box construction of non-malleable encryption from semantically secure encryptionFunctional Encryption: Deterministic to Randomized Functions from Simple AssumptionsInjective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?Indistinguishability Obfuscation: From Approximate to ExactCCA security and trapdoor functions via key-dependent-message securityA proof of security of Yao's protocol for two-party computationGeneric authenticated key exchange in the quantum random oracle modelSearchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensionsCryptographic pseudorandom generators can make cryptosystems problematicAmplifying the security of functional encryption, unconditionallyChosen ciphertext security from injective trapdoor functionsA Note on Perfect Correctness by Derandomization


Uses Software



This page was built for publication: Advances in Cryptology - EUROCRYPT 2004