Advances in Cryptology - CRYPTO 2003
From MaRDI portal
Publication:5428142
DOI10.1007/b11817zbMath1122.94359OpenAlexW2480001466WikidataQ56235047 ScholiaQ56235047MaRDI QIDQ5428142
Ran Canetti, Hugo Krawczyk, Jesper Buus Nielsen
Publication date: 28 November 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b11817
Related Items (59)
Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved ⋮ The ECCA Security of Hybrid Encryptions ⋮ Generic plaintext equality and inequality proofs ⋮ Attribute-based conditional proxy re-encryption in the standard model under LWE ⋮ Selectively linkable group signatures -- stronger security and preserved verifiability ⋮ On the gold standard for security of universal steganography ⋮ Chosen ciphertext secure keyed-homomorphic public-key cryptosystems ⋮ Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message ⋮ Composable and finite computational security of quantum message transmission ⋮ Hardware security without secure hardware: how to decrypt with a password and a server ⋮ Reconciling non-malleability with homomorphic encryption ⋮ Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles ⋮ Augmented Learning with Errors: The Untapped Potential of the Error Term ⋮ Almost tightly-secure re-randomizable and replayable CCA-secure public key encryption ⋮ Sender-binding key encapsulation ⋮ Universal Composition with Responsive Environments ⋮ Chosen ciphertext secure keyed two-level homomorphic encryption ⋮ A new security notion for PKC in the standard model: weaker, simpler, and still realizing secure channels ⋮ Achievable \textsf{CCA2} relaxation for homomorphic encryption ⋮ Mix-nets from re-randomizable and replayable CCA-secure public-key encryption ⋮ Traceable receipt-free encryption ⋮ Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security ⋮ Identity-based encryption for fair anonymity applications: defining, implementing, and applying rerandomizable RCCA-secure IBE ⋮ Onion routing with replies ⋮ ParaDiSE: efficient threshold authenticated encryption in fully malicious model ⋮ Group homomorphic encryption: characterizations, impossibility results, and applications ⋮ Universally composable symbolic security analysis ⋮ Improving speed and security in updatable encryption schemes ⋮ CCA updatable encryption against malicious re-encryption attacks ⋮ Signcryption schemes with threshold unsigncryption, and applications ⋮ Joint state composition theorems for public-key encryption and digital signature functionalities with local computation ⋮ Non-malleable encryption: simpler, shorter, stronger ⋮ Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts ⋮ Improved proxy re-encryption schemes with applications to secure distributed storage ⋮ Improving the efficiency of re-randomizable and replayable CCA secure public key encryption ⋮ Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption ⋮ Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search ⋮ Tag-KEM/DEM: A new framework for hybrid encryption ⋮ Grey-Box Public-Key Steganography ⋮ Chosen-Ciphertext Secure Fully Homomorphic Encryption ⋮ Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts ⋮ Fully Secure Threshold Unsigncryption ⋮ PRE: stronger security notions and efficient construction with non-interactive opening ⋮ Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed? ⋮ Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption ⋮ Non-Malleable Encryption: Simpler, Shorter, Stronger ⋮ SEMD: secure and efficient message dissemination with policy enforcement in VANET ⋮ Towards Key-Dependent Message Security in the Standard Model ⋮ Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption ⋮ Security under message-derived keys: signcryption in iMessage ⋮ Conditional Proxy Broadcast Re-Encryption ⋮ Abuse resistant law enforcement access systems ⋮ Fully secure ABE with outsourced decryption against chosen ciphertext attack ⋮ Revisiting (R)CCA security and replay protection ⋮ Transferable e-cash: a cleaner model and the first practical instantiation ⋮ Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security ⋮ Leakage resilience from program obfuscation ⋮ Message Transmission with Reverse Firewalls—Secure Communication on Corrupted Machines ⋮ Universally Composable Security Analysis of TLS
This page was built for publication: Advances in Cryptology - CRYPTO 2003