Revisiting (R)CCA Security and Replay Protection
暂无分享,去创建一个
[1] Tal Rabin,et al. On the Security of Joint Signature and Encryption , 2002, EUROCRYPT.
[2] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[3] Matthew Green,et al. Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.
[4] Manoj Prabhakaran,et al. Rerandomizable RCCA Encryption , 2007, CRYPTO.
[5] Ueli Maurer,et al. Indistinguishability of Random Systems , 2002, EUROCRYPT.
[6] Hugo Krawczyk,et al. Relaxing Chosen-Ciphertext Security , 2003, CRYPTO.
[7] Mihir Bellare,et al. Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..
[8] Ueli Maurer,et al. Strengthening Access Control Encryption , 2017, ASIACRYPT.
[9] Georg Fuchsbauer,et al. Enhanced Chosen-Ciphertext Security and Applications , 2014, Public Key Cryptography.
[10] Abhi Shelat,et al. Bounded CCA2-Secure Encryption , 2007, ASIACRYPT.
[11] Moni Naor,et al. Immunizing Encryption Schemes from Decryption Errors , 2004, EUROCRYPT.
[12] Ueli Maurer,et al. Constructing Confidential Channels from Authenticated Channels - Public-Key Encryption Revisited , 2013, IACR Cryptol. ePrint Arch..
[13] Ueli Maurer,et al. Indistinguishability Amplification , 2007, CRYPTO.
[14] Allison Bishop,et al. Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security , 2012, EUROCRYPT.
[15] Ueli Maurer,et al. Abstract Cryptography , 2011, ICS.
[16] Michael Backes,et al. Public-Key Steganography with Active Attacks , 2005, TCC.
[17] Jens Groth,et al. Rerandomizable and Replayable Adaptive Chosen Ciphertext Attack Secure Cryptosystems , 2004, TCC.
[18] Manoj Prabhakaran,et al. Homomorphic Encryption with CCA Security , 2008, ICALP.
[19] Hugo Krawczyk,et al. The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?) , 2001, CRYPTO.
[20] Ran Canetti,et al. Chosen-ciphertext secure proxy re-encryption , 2007, CCS '07.
[21] Anja Lehmann,et al. (R)CCA Secure Updatable Encryption with Integrity Protection , 2019, IACR Cryptol. ePrint Arch..
[22] Ueli Maurer,et al. Constructive Cryptography - A New Paradigm for Security Definitions and Proofs , 2011, TOSCA.