Theory of Cryptography
From MaRDI portal
Publication:5711672
DOI10.1007/b106171zbMath1079.94537OpenAlexW4251449056WikidataQ59379672 ScholiaQ59379672MaRDI QIDQ5711672
Shai Halevi, Ran Canetti, Jonathan N. Katz
Publication date: 7 December 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b106171
Related Items
SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions, Receiver Selective Opening Security from Indistinguishability Obfuscation, Tightness subtleties for multi-user PKE notions, A unified and composable take on ratcheting, Simulation-based selective opening security for receivers under chosen-ciphertext attacks, Bounded Collusion ABE for TMs from IBE, Universal Composition with Responsive Environments, Anonymous public key encryption under corruptions, Quantum encryption with certified deletion, revisited: public key, attribute-based, and classical communication, Simulation-based bi-selective opening security for public key encryption, Possibility and impossibility results for receiver selective opening secure PKE in the multi-challenge setting, Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks, Possibility and impossibility results for selective decommitments, Efficient one-sided adaptively secure computation, Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption, Practical public key encryption with selective opening security for receivers, Efficient hybrid encryption from ID-based encryption, Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions, Towards Key-Dependent Message Security in the Standard Model, A new approach for UC security concurrent deniable authentication, Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening, On selective-opening security of deterministic primitives