More DCCA-secure public-key encryptions from KEM + DEM style hybrid paradigms and some observations on the 'inner-outer' structure
暂无分享,去创建一个
[1] Yue Wang,et al. A new proxy blind signature scheme , 2012, Int. J. Grid Util. Comput..
[2] Adam O'Neill,et al. Adaptive Trapdoor Functions and Chosen-Ciphertext Security , 2010, EUROCRYPT.
[3] Kaoru Kurosawa,et al. Tag-KEM/DEM: A New Framework for Hybrid Encryption , 2008, Journal of Cryptology.
[4] Haibo Tian. A new strong multiple designated verifiers signature , 2012, Int. J. Grid Util. Comput..
[5] Allison Bishop,et al. Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security , 2012, EUROCRYPT.
[6] Yvo Desmedt,et al. A New Paradigm of Hybrid Encryption Scheme , 2004, CRYPTO.
[7] Eike Kiltz,et al. Chosen-Ciphertext Security from Tag-Based Encryption , 2006, TCC.
[8] Eike Kiltz,et al. Secure Hybrid Encryption from Weakened Key Encapsulation , 2007, CRYPTO.
[9] Mihir Bellare,et al. Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..
[10] Javier Herranz,et al. Some (in)sufficient conditions for secure hybrid encryption , 2010, Inf. Comput..
[11] Michael K. Reiter,et al. Alternatives to Non-malleability: Definitions, Constructions, and Applications (Extended Abstract) , 2004, TCC.
[12] Steven Myers,et al. Bit Encryption Is Complete , 2009, 2009 50th Annual IEEE Symposium on Foundations of Computer Science.
[13] Bao Li,et al. Universally composable zero-knowledge sets , 2012, Int. J. Grid Util. Comput..
[14] Ronald Cramer,et al. Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack , 2003, SIAM J. Comput..
[15] Hugo Krawczyk,et al. Relaxing Chosen-Ciphertext Security , 2003, CRYPTO.
[16] Georg Fuchsbauer,et al. Enhanced Chosen-Ciphertext Security and Applications , 2014, Public Key Cryptography.
[17] Moni Naor,et al. Public-key cryptosystems provably secure against chosen ciphertext attacks , 1990, STOC '90.
[18] Tal Malkin,et al. Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One , 2008, TCC.
[19] Alexander W. Dent,et al. A Designer's Guide to KEMs , 2003, IMACC.
[20] Tal Rabin,et al. On the Security of Joint Signature and Encryption , 2002, EUROCRYPT.
[21] Abhi Shelat,et al. Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One , 2006, CRYPTO.
[22] Abhi Shelat,et al. Bounded CCA2-Secure Encryption , 2007, ASIACRYPT.