CASE: a new frontier in public-key authenticated encryption
From MaRDI portal
Publication:6582172
DOI10.1007/978-3-031-48618-0_7zbMath1544.94213MaRDI QIDQ6582172
Rajeev Raghunath, Jayesh Singla, Shashank Agrawal, Manoj Prabhakaran, Shweta Agrawal
Publication date: 2 August 2024
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- How to construct efficient signcryption schemes on elliptic curves
- Probabilistic encryption
- A constructive perspective on signcryption security
- Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed?
- Security under message-derived keys: signcryption in iMessage
- Analysing the HPKE standard
- Multi-designated receiver signed public key encryption
- Constructive Cryptography – A New Paradigm for Security Definitions and Proofs
- Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data
- Online/Offline Identity-Based Signcryption Revisited
- A Closer Look at Anonymity and Robustness in Encryption Schemes
- On the Joint Security of Encryption and Signature, Revisited
- Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents
- Robust Encryption
- Compact Attribute-Based Encryption and Signcryption for General Circuits from Multilinear Maps
- Functional Signcryption: Notion, Construction, and Applications
- Threshold Attribute-Based Signcryption
- Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups
- Practical Signcryption
- Nonmalleable Cryptography
- Robust Encryption, Revisited
- Identity Based Public Verifiable Signcryption Scheme
- ID Based Signcryption Scheme in Standard Model
- Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt”
- Advances in Cryptology - CRYPTO 2003
- Information Security and Privacy
- Public Key Cryptography - PKC 2005
- Public Key Cryptography - PKC 2006
This page was built for publication: CASE: a new frontier in public-key authenticated encryption