Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One
暂无分享,去创建一个
[1] Ronald Cramer,et al. Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption , 2001, EUROCRYPT.
[2] Oded Goldreich. Foundations of Cryptography: Volume 1 , 2006 .
[3] Mihir Bellare,et al. Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..
[4] Moni Naor,et al. Bit commitment using pseudorandomness , 1989, Journal of Cryptology.
[5] Ivan Damgård,et al. Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes , 2000, ASIACRYPT.
[6] Victor Shoup. Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings , 2005, CRYPTO.
[7] Ivan Damgård,et al. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols , 1994, CRYPTO.
[8] Yvo Desmedt,et al. Advances in Cryptology — CRYPTO ’94 , 2001, Lecture Notes in Computer Science.
[9] John Rompel,et al. One-way functions are necessary and sufficient for secure signatures , 1990, STOC '90.
[10] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[11] Yehuda Lindell,et al. A Framework for Password-Based Authenticated Key Exchange , 2003, EUROCRYPT.
[12] Ronald Cramer,et al. A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack , 1998, CRYPTO.
[13] Amit Sahai,et al. A Unified Methodology For Constructing Public-Key Encryption Schemes Secure Against Adaptive Chosen-Ciphertext Attack , 2002, IACR Cryptol. ePrint Arch..
[14] Moni Naor,et al. Nonmalleable Cryptography , 2000, SIAM Rev..
[15] Cynthia Dwork,et al. A public-key cryptosystem with worst-case/average-case equivalence , 1997, STOC '97.
[16] Oded Goldreich. Foundations of Cryptography: Index , 2001 .
[17] Aggelos Kiayias,et al. Traitor Tracing with Constant Transmission Rate , 2002, EUROCRYPT.
[18] Hugo Krawczyk,et al. Advances in Cryptology - CRYPTO '98 , 1998 .
[19] Tatsuaki Okamoto,et al. Advances in Cryptology — ASIACRYPT 2000 , 2000, Lecture Notes in Computer Science.
[20] Rafail Ostrovsky,et al. Minimum resource zero knowledge proofs , 1989, 30th Annual Symposium on Foundations of Computer Science.
[21] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2005, STOC '05.
[22] Abhi Shelat,et al. Unconditional Characterizations of Non-interactive Zero-Knowledge , 2005, CRYPTO.
[23] Amit Sahai,et al. Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization , 1999, CRYPTO.
[24] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[25] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .