Sender-anamorphic encryption reformulated: achieving robust and generic constructions
From MaRDI portal
Publication:6605321
DOI10.1007/978-981-99-8736-8_5zbMATH Open1547.94427MaRDI QIDQ6605321
Yi Wang, Xin-Yi Huang, Mordechai M. Yung, Rongmao Chen
Publication date: 13 September 2024
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Probabilistic encryption
- Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved
- Anamorphic encryption: private communication against a dictator
- Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption
- Security of Symmetric Encryption against Mass Surveillance
- A More Cautious Approach to Security Against Mass Surveillance
- Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings
- Robust Encryption
- Trapdoors for hard lattices and new cryptographic constructions
- Kleptography from Standard Assumptions and Applications
- Rerandomizable RCCA Encryption
- Secure Hybrid Encryption from Weakened Key Encapsulation
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- The Prisoners’ Problem and the Subliminal Channel
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Theory of Cryptography
- A Public-Key Encryption Scheme with Pseudo-random Ciphertexts
- On lattices, learning with errors, random linear codes, and cryptography
- Topics in Cryptology – CT-RSA 2004
Related Items (4)
Anamorphic encryption, revisited ⋮ Anamorphic encryption: new constructions and homomorphic realizations ⋮ Limits of black-box anamorphic encryption ⋮ Public-key anamorphism in (CCA-secure) public-key encryption and beyond
This page was built for publication: Sender-anamorphic encryption reformulated: achieving robust and generic constructions