Simple and Efficient KDM-CCA Secure Public Key Encryption
暂无分享,去创建一个
Fuyuki Kitagawa | Keisuke Tanaka | Takahiro Matsuda | Takahiro Matsuda | Fuyuki Kitagawa | Keisuke Tanaka
[1] Dennis Hofheinz,et al. Kurosawa-Desmedt Meets Tight Security , 2017, CRYPTO.
[2] Rafail Ostrovsky,et al. Circular-Secure Encryption from Decision Diffie-Hellman , 2008, CRYPTO.
[3] Eike Kiltz,et al. Secure Hybrid Encryption from Weakened Key Encapsulation , 2007, CRYPTO.
[4] Benoît Libert,et al. Lossy Algebraic Filters with Short Tags , 2019, Public Key Cryptography.
[5] Ivan Damgård,et al. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.
[6] Dennis Hofheinz,et al. Circular Chosen-Ciphertext Security with Compact Ciphertexts , 2013, EUROCRYPT.
[7] Shuai Han,et al. Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions , 2016, ASIACRYPT.
[8] Tibor Jager,et al. Tightly Secure Signatures and Public-Key Encryption , 2012, CRYPTO.
[9] David Cash,et al. Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems , 2009, CRYPTO.
[10] Yuval Ishai,et al. Extending Oblivious Transfers Efficiently , 2003, CRYPTO.
[11] Yvo Desmedt,et al. A New Paradigm of Hybrid Encryption Scheme , 2004, CRYPTO.
[12] Yuval Ishai,et al. Semantic Security under Related-Key Attacks and Applications , 2011, ICS.
[13] Fuyuki Kitagawa,et al. A Framework for Achieving KDM-CCA Secure Public-Key Encryption , 2018, IACR Cryptol. ePrint Arch..
[14] Ronald Cramer,et al. Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption , 2001, EUROCRYPT.
[15] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[16] Eike Kiltz,et al. Practical Chosen Ciphertext Secure Encryption from Factoring , 2009, EUROCRYPT.
[17] Moni Naor,et al. Public-key cryptosystems provably secure against chosen ciphertext attacks , 1990, STOC '90.
[18] Dingding Jia,et al. KDM-CCA Security from RKA Secure Authenticated Encryption , 2015, EUROCRYPT.
[19] Jan Camenisch,et al. An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation , 2001, IACR Cryptol. ePrint Arch..
[20] Moti Yung,et al. Efficient Circuit-Size Independent Public Key Encryption with KDM Security , 2011, EUROCRYPT.
[21] John Black,et al. Encryption-Scheme Security in the Presence of Key-Dependent Messages , 2002, Selected Areas in Cryptography.
[22] Zvika Brakerski,et al. Circular and Leakage Resilient Public-Key Encryption Under Subgroup Indistinguishability (or: Quadratic Residuosity Strikes Back) , 2010, IACR Cryptol. ePrint Arch..
[23] Jan Camenisch,et al. A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks , 2009, IACR Cryptol. ePrint Arch..