Multi-instance secure public-key encryption
From MaRDI portal
Publication:6088987
DOI10.1007/978-3-031-31371-4_12zbMath1527.94024MaRDI QIDQ6088987
Hans Heum, Martijn Stam, Carlo Brunetta
Publication date: 16 November 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- New hash functions and their use in authentication and set equality
- A modular analysis of the Fujisaki-Okamoto transformation
- Hybrid encryption in a multi-user setting, revisited
- Secure integration of asymmetric and symmetric encryption schemes
- Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed?
- Everybody's a target: scalability in public-key encryption
- Tightly-secure authenticated key exchange, revisited
- Password hashing and preprocessing
- Tightness subtleties for multi-user PKE notions
- Tightly CCA-secure encryption scheme in a multi-user setting with corruptions
- Tag-KEM/DEM: A new framework for hybrid encryption
- Notions of Black-Box Reductions, Revisited
- Security of Symmetric Encryption against Mass Surveillance
- Multi-instance Security and Its Application to Password-Based Cryptography
- On the Selective Opening Security of Practical Public-Key Encryption Schemes
- Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks
- Random Oracles in a Quantum World
- Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack
- Secure integration of asymmetric and symmetric encryption schemes
- Advances in Cryptology – CRYPTO 2004
- Probability Inequalities for Sums of Bounded Random Variables
- Why Proving HIBE Systems Secure Is Difficult
- On the Impossibility of Tight Cryptographic Reductions
- Theory of Cryptography
- Multi-user CDH problems and the concrete security of \(\mathsf{NAXOS}\) and \(\mathsf{X3DH}\)
- Simulation-based bi-selective opening security for public key encryption
This page was built for publication: Multi-instance secure public-key encryption