SoK: public key encryption with openings
From MaRDI portal
Publication:6635892
DOI10.1007/978-3-031-57728-4_2MaRDI QIDQ6635892
Martijn Stam, Carlo Brunetta, Hans Heum
Publication date: 12 November 2024
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Possibility and impossibility results for selective decommitments
- Multi-key authenticated encryption with corruptions: reductions are lossy
- Tightly-secure authenticated key exchange, revisited
- Tightness subtleties for multi-user PKE notions
- On fingerprinting attacks and length-hiding encryption
- Tightly CCA-secure encryption scheme in a multi-user setting with corruptions
- Possibility and impossibility results for receiver selective opening secure PKE in the multi-challenge setting
- Non-malleability Under Selective Opening Attacks: Implication and Separation
- Standard Security Does Imply Security Against Selective Opening for Markov Distributions
- Selective Opening Security for Receivers
- Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture
- Standard Security Does Not Imply Security against Selective-Opening
- A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
- On Hiding a Plaintext Length by Preencryption
- How to share a secret
- Standard Security Does Not Imply Indistinguishability Under Selective Opening
- Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
- Communication Theory of Secrecy Systems*
- Foundations of Cryptography
- Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks
- Tightly-Secure Authenticated Key Exchange
- Advances in Cryptology - CRYPTO 2003
- On the Impossibility of Tight Cryptographic Reductions
- Standard versus Selective Opening Security: Separation and Equivalence Results
- Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions
- Almost tight multi-user security under adaptive corruptions \& leakages in the standard model
- Anonymous public key encryption under corruptions
- Simulation-based bi-selective opening security for public key encryption
This page was built for publication: SoK: public key encryption with openings
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6635892)