메뉴 건너뛰기




Volumn 6110 LNCS, Issue , 2010, Pages 381-402

Encryption schemes secure against chosen-ciphertext selective opening attacks

Author keywords

[No Author keywords available]

Indexed keywords

ACTIVE ADVERSARY; AUTHENTICATION CODES; CCA-SECURE SCHEMES; CIPHERTEXTS; DIFFIE HELLMAN; ENCRYPTION SCHEMES; IND-CCA; MESSAGE DISTRIBUTION; NEW SOLUTIONS; PROOF SYSTEM; PUBLIC KEYS; PUBLIC-KEY ENCRYPTION SCHEME; SECURITY NOTION; SMALL DEVICES; TIME AND SPACE; TRAPDOOR ONE-WAY PERMUTATION;

EID: 77954642903     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-13190-5_20     Document Type: Conference Paper
Times cited : (73)

References (30)
  • 1
    • 85048601848 scopus 로고
    • Cryptographic protocols provably secure against dynamic adversaries
    • Rueppel, R.A. (ed.) EUROCRYPT 1992. Springer, Heidelberg
    • Beaver, D., Haber, S.: Cryptographic protocols provably secure against dynamic adversaries. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 307-323. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.658 , pp. 307-323
    • Beaver, D.1    Haber, S.2
  • 2
    • 84957629783 scopus 로고    scopus 로고
    • Relations among Notions of Security for Public-Key Encryption Schemes
    • Advances in Cryptology - CRYPTO '98
    • Bellare, M., Desai, A., Pointcheval, D., Rogaway, P.: Relations among notions of security for public-key encryption schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 26-45. Springer, Heidelberg (1998) (Pubitemid 128118995)
    • (1998) LECTURE NOTES in COMPUTER SCIENCE , Issue.1462 , pp. 26-45
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 3
    • 67650685947 scopus 로고    scopus 로고
    • Possibility and impossibility results for encryption and commitment secure under selective opening
    • EUROCRYPT 2009. Springer, Heidelberg
    • Bellare,M., Hofheinz, D., Yilek, S.: Possibility and impossibility results for encryption and commitment secure under selective opening. In: EUROCRYPT 2009. LNCS, vol. 5479, pp. 1-35. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 1-35
    • Hofheinz, D.1    Yilek, S.2
  • 6
    • 0021522644 scopus 로고
    • How to generate cryptographically strong sequences of pseudorandom bits
    • Blum, M.,Micali, S.:How to generate cryptographically strong sequences of pseudorandom bits. SIAM Journal on Computing 13(4), 850-864 (1984)
    • (1984) SIAM Journal on Computing , vol.13 , Issue.4 , pp. 850-864
    • Blum, M.1    Micali, S.2
  • 7
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
    • Boneh, D., Franklin, M.K.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.K.2
  • 8
    • 33745854208 scopus 로고    scopus 로고
    • Chosen-ciphertext security from identity-based encryption
    • Boneh, D., Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. SIAM Journal on Computing 36(5), 915-942 (2006)
    • (2006) SIAM Journal on Computing , vol.36 , Issue.5 , pp. 915-942
    • Boneh, D.1    Canetti, R.2    Halevi, S.3    Katz, J.4
  • 9
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • IEEE Computer Society Press, Los Alamitos
    • Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: 42nd FOCS, October 2001, pp. 136-145. IEEE Computer Society Press, Los Alamitos (2001)
    • (2001) 42nd FOCS, October 2001 , pp. 136-145
    • Canetti, R.1
  • 10
    • 0029723583 scopus 로고    scopus 로고
    • Adaptively secure multi-party computation
    • ACM Press, New York
    • Canetti, R., Feige, U., Goldreich, O., Naor, M.: Adaptively secure multi-party computation. In: 28th ACM STOC, pp. 639-648. ACM Press, New York (1996)
    • (1996) 28th ACM STOC , pp. 639-648
    • Canetti, R.1    Feige, U.2    Goldreich, O.3    Naor, M.4
  • 11
    • 84958626761 scopus 로고    scopus 로고
    • Deniable encryption
    • Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
    • Canetti, R., Dwork, C., Naor, M., Ostrovsky, R.: Deniable encryption. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 90-104. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 90-104
    • Canetti, R.1    Dwork, C.2    Naor, M.3    Ostrovsky, R.4
  • 12
    • 35248875326 scopus 로고    scopus 로고
    • Relaxing chosen-ciphertext security
    • Boneh, D. (ed.) CRYPTO 2003. Springer, Heidelberg
    • Canetti, R., Krawczyk, H., Nielsen, J.B.: Relaxing chosen-ciphertext security. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 565-582. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2729 , pp. 565-582
    • Canetti, R.1    Krawczyk, H.2    Nielsen, J.B.3
  • 13
    • 84870707379 scopus 로고    scopus 로고
    • A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
    • Krawczyk, H. (ed.) CRYPTO 1998. Springer, Heidelberg
    • Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 13-25. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 14
    • 84947267092 scopus 로고    scopus 로고
    • Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
    • Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
    • Cramer, R., Shoup, V.: Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 45-64. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 45-64
    • Cramer, R.1    Shoup, V.2
  • 15
    • 84974602942 scopus 로고    scopus 로고
    • Improved non-committing encryption schemes based on general complexity assumptions
    • Bellare, M. (ed.) CRYPTO 2000. Springer, Heidelberg
    • Damg̊ard, I., Nielsen, J.B.: Improved non-committing encryption schemes based on general complexity assumptions. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 432-450. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1880 , pp. 432-450
    • Damg̊ard, I.1    Nielsen, J.B.2
  • 22
    • 38049165151 scopus 로고    scopus 로고
    • Secure hybrid encryption from weakened key encapsulation
    • Menezes, A. (ed.) CRYPTO 2007. Springer, Heidelberg
    • Hofheinz, D., Kiltz, E.: Secure hybrid encryption from weakened key encapsulation. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 553-571. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622 , pp. 553-571
    • Hofheinz, D.1    Kiltz, E.2
  • 23
    • 67650677267 scopus 로고    scopus 로고
    • Practical chosen ciphertext secure encryption from factoring
    • Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
    • Hofheinz, D., Kiltz, E.: Practical chosen ciphertext secure encryption from factoring. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 313-332. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 313-332
    • Hofheinz, D.1    Kiltz, E.2
  • 24
    • 35048822047 scopus 로고    scopus 로고
    • Round-optimal secure two-party computation
    • Franklin,M. (ed.) CRYPTO 2004. Springer, Heidelberg
    • Katz, J., Ostrovsky, R.: Round-optimal secure two-party computation. In: Franklin,M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 335-354. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 335-354
    • Katz, J.1    Ostrovsky, R.2
  • 25
    • 67650667958 scopus 로고    scopus 로고
    • A new randomness extraction paradigm for hybrid encryption
    • Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
    • Kiltz, E., Pietrzak, K., Stam, M., Yung, M.: A new randomness extraction paradigm for hybrid encryption. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 590-609. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 590-609
    • Kiltz, E.1    Pietrzak, K.2    Stam, M.3    Yung, M.4
  • 26
    • 35048835796 scopus 로고    scopus 로고
    • A New Paradigm of Hybrid Encryption Scheme
    • Advances in Cryptology - CRYPTO 2004
    • Kurosawa, K., Desmedt, Y.: A new paradigm of hybrid encryption scheme. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 426-442. Springer, Heidelberg (2004) (Pubitemid 39138091)
    • (2004) LECTURE NOTES in COMPUTER SCIENCE , Issue.3152 , pp. 426-442
    • Kurosawa, K.1    Desmedt, Y.2
  • 27
    • 0024983231 scopus 로고
    • Public-key cryptosystems provably secure against chosen ciphertext attacks
    • ACM Press, New York
    • Naor, M., Yung, M.: Public-key cryptosystems provably secure against chosen ciphertext attacks. In: 22nd STOC. ACM Press, New York (1990)
    • (1990) 22nd STOC
    • Naor, M.1    Yung, M.2
  • 28
    • 84937420653 scopus 로고    scopus 로고
    • Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case
    • Yung, M. (ed.) CRYPTO 2002. Springer, Heidelberg
    • Nielsen, J.B.: Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 111-126. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 111-126
    • Nielsen, J.B.1
  • 29
    • 51849152661 scopus 로고    scopus 로고
    • Lossy trapdoor functions and their applications
    • ACM Press, New York
    • Peikert, C., Waters, B.: Lossy trapdoor functions and their applications. In: 40th STOC, pp. 187-196. ACM Press, New York (2008)
    • (2008) 40th STOC , pp. 187-196
    • Peikert, C.1    Waters, B.2
  • 30
    • 84974554584 scopus 로고
    • Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
    • Feigenbaum, J. (ed.) CRYPTO 1991. Springer, Heidelberg
    • Rackoff, C., Simon, D.R.: Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 433-444. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.576 , pp. 433-444
    • Rackoff, C.1    Simon, D.R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.