메뉴 건너뛰기




Volumn 6223 LNCS, Issue , 2010, Pages 1-20

Circular and leakage resilient public-key encryption under subgroup indistinguishability (or: Quadratic residuosity strikes back)

Author keywords

[No Author keywords available]

Indexed keywords

AFFINE FUNCTION; AUXILIARY INPUTS; COMPOSITE MODULUS; INDISTINGUISHABILITY; LEAKAGE RATES; PROOF SYSTEM; PUBLIC-KEY ENCRYPTION; PUBLIC-KEY ENCRYPTION SCHEME; SAFE PRIMES; SECRET KEY;

EID: 77957010426     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-14623-7_1     Document Type: Conference Paper
Times cited : (143)

References (25)
  • 1
    • 33646045378 scopus 로고    scopus 로고
    • Soundness of formal encryption in the presence of key-cycles
    • di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) LNCS Springer, Heidelberg
    • Adão, P., Bana, G., Herzog, J.C., Scedrov, A.: Soundness of formal encryption in the presence of key-cycles. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 374-396. Springer, Heidelberg (2005)
    • (2005) ESORICS 2005 , vol.3679 , pp. 374-396
    • Adão, P.1    Bana, G.2    Herzog, J.C.3    Scedrov, A.4
  • 2
    • 70350627587 scopus 로고    scopus 로고
    • Simultaneous hardcore bits and cryptography against memory attacks
    • Reingold, O. (ed.) LNCS Springer, Heidelberg
    • Akavia, A., Goldwasser, S., Vaikuntanathan, V.: Simultaneous hardcore bits and cryptography against memory attacks. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 474-495. Springer, Heidelberg (2009)
    • (2009) TCC 2009 , vol.5444 , pp. 474-495
    • Akavia, A.1    Goldwasser, S.2    Vaikuntanathan, V.3
  • 4
    • 77954643565 scopus 로고    scopus 로고
    • Bounded key-dependent message security
    • Gilbert, H. (ed.) LNCS Springer, Heidelberg
    • Barak, B., Haitner, I., Hofheinz, D., Ishai, Y.: Bounded key-dependent message security. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 423-444. Springer, Heidelberg (2010)
    • (2010) EUROCRYPT 2010 , vol.6110 , pp. 423-444
    • Barak, B.1    Haitner, I.2    Hofheinz, D.3    Ishai, Y.4
  • 5
    • 35248822352 scopus 로고    scopus 로고
    • Encryption-scheme security in the presence of key-dependent messages
    • Nyberg, K., Heys, H.M. (eds.) LNCS Springer, Heidelberg
    • Black, J., Rogaway, P., Shrimpton, T.: Encryption-scheme security in the presence of key-dependent messages. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 62-75. Springer, Heidelberg (2003)
    • (2003) SAC 2002 , vol.2595 , pp. 62-75
    • Black, J.1    Rogaway, P.2    Shrimpton, T.3
  • 6
    • 51849118137 scopus 로고    scopus 로고
    • Circular-secure encryption from decision diffie-hellman
    • Wagner, D. (ed.) LNCS Springer, Heidelberg
    • Boneh, D., Halevi, S., Hamburg, M., Ostrovsky, R.: Circular-secure encryption from decision diffie-hellman. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 108-125. Springer, Heidelberg (2008)
    • (2008) CRYPTO 2008 , vol.5157 , pp. 108-125
    • Boneh, D.1    Halevi, S.2    Hamburg, M.3    Ostrovsky, R.4
  • 9
    • 84945135810 scopus 로고    scopus 로고
    • An efficient system for non-transferable anonymous credentials with optional anonymity revocation
    • Pfitzmann, B. (ed.) LNCS Springer, Heidelberg
    • Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EU-ROCRYPT 2001. LNCS, vol. 2045, pp. 93-118. Springer, Heidelberg (2001)
    • (2001) EU-ROCRYPT 2001 , vol.2045 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 10
    • 84947267092 scopus 로고    scopus 로고
    • Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption
    • Knudsen, L.R. (ed.) LNCS Springer, Heidelberg
    • Cramer, R., Shoup, V.: Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 45-64. Springer, Heidelberg (2002)
    • (2002) EUROCRYPT 2002 , vol.2332 , pp. 45-64
    • Cramer, R.1    Shoup, V.2
  • 11
    • 84867553981 scopus 로고    scopus 로고
    • A generalisation, a simplification and some applications of paillier's probabilistic public-key system
    • Kim, K.-c. (ed.) LNCS Springer, Heidelberg
    • Damgård, I., Jurik, M.: A generalisation, a simplification and some applications of paillier's probabilistic public-key system. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, pp. 119-136. Springer, Heidelberg (2001)
    • (2001) PKC 2001 , vol.1992 , pp. 119-136
    • Damgård, I.1    Jurik, M.2
  • 12
    • 77949580684 scopus 로고    scopus 로고
    • Public-key encryption schemes with auxiliary inputs
    • Micciancio, D. (ed.) LNCS Springer, Heidelberg
    • Dodis, Y., Goldwasser, S., Kalai, Y., Peikert, C., Vaikuntanathan, V.: Public-key encryption schemes with auxiliary inputs. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 361-381. Springer, Heidelberg (2010)
    • (2010) TCC 2010 , vol.5978 , pp. 361-381
    • Dodis, Y.1    Goldwasser, S.2    Kalai, Y.3    Peikert, C.4    Vaikuntanathan, V.5
  • 13
    • 70350674336 scopus 로고    scopus 로고
    • On cryptography with auxiliary input
    • Mitzenmacher, M. (ed.) ACM, New York
    • Dodis, Y., Kalai, Y.T., Lovett, S.: On cryptography with auxiliary input. In: Mitzenmacher, M. (ed.) STOC, pp. 621-630. ACM, New York (2009)
    • (2009) STOC , pp. 621-630
    • Dodis, Y.1    Kalai, Y.T.2    Lovett, S.3
  • 14
    • 0024868772 scopus 로고
    • A hard-core predicate for all one-way functions
    • ACM, New York
    • Goldreich, O., Levin, L.A.: A hard-core predicate for all one-way functions. In: STOC, pp. 25-32. ACM, New York (1989)
    • (1989) STOC , pp. 25-32
    • Goldreich, O.1    Levin, L.A.2
  • 15
    • 85050160774 scopus 로고
    • Probabilistic encryption and how to play mental poker keeping secret all partial information
    • ACM, New York
    • Goldwasser, S., Micali, S.: Probabilistic encryption and how to play mental poker keeping secret all partial information. In: STOC, pp. 365-377. ACM, New York (1982)
    • (1982) STOC , pp. 365-377
    • Goldwasser, S.1    Micali, S.2
  • 18
    • 77957006299 scopus 로고    scopus 로고
    • Halevi, S. (ed.) LNCS Springer, Heidelberg
    • Halevi, S. (ed.): CRYPTO 2009. LNCS, vol. 5677. Springer, Heidelberg (2009)
    • (2009) CRYPTO 2009 , vol.5677
  • 19
    • 77957013057 scopus 로고    scopus 로고
    • Lossy trapdoor functions from smooth homomor-phic hash proof systems
    • Hemenway, B., Ostrovsky, R.: Lossy trapdoor functions from smooth homomor-phic hash proof systems. In: Electronic Colloquium on Computational Complexity (ECCC), vol. 16(127) (2009), http://eccc.uni-trier.de/report/2009/ 127/
    • (2009) Electronic Colloquium on Computational Complexity (ECCC) , vol.16 , Issue.127
    • Hemenway, B.1    Ostrovsky, R.2
  • 20
    • 67650667958 scopus 로고    scopus 로고
    • A new randomness extraction paradigm for hybrid encryption
    • Joux, A. (ed.) LNCS Springer, Heidelberg
    • Kiltz, E., Pietrzak, K., Stam, M., Yung, M.: A new randomness extraction paradigm for hybrid encryption. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 590-609. Springer, Heidelberg (2010)
    • (2010) EUROCRYPT 2009 , vol.5479 , pp. 590-609
    • Kiltz, E.1    Pietrzak, K.2    Stam, M.3    Yung, M.4
  • 21
    • 35048855625 scopus 로고    scopus 로고
    • Sound computational interpretation of formal encryption with composed keys
    • Lim, J.-I., Lee, D.-H. (eds.) LNCS Springer, Heidelberg
    • Laud, P., Corin, R.: Sound computational interpretation of formal encryption with composed keys. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 55-66. Springer, Heidelberg (2004)
    • (2004) ICISC 2003 , vol.2971 , pp. 55-66
    • Laud, P.1    Corin, R.2
  • 23
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Stern, J. (ed.) LNCS Springer, Heidelberg
    • Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223-238. Springer, Heidelberg (1999)
    • (1999) EUROCRYPT 1999 , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 24
    • 51849152661 scopus 로고    scopus 로고
    • Lossy trapdoor functions and their applications
    • Ladner, R.E., Dwork, C. (eds.) ACM, New York
    • Peikert, C., Waters, B.: Lossy trapdoor functions and their applications. In: Ladner, R.E., Dwork, C. (eds.) STOC, pp. 187-196. ACM, New York (2008)
    • (2008) STOC , pp. 187-196
    • Peikert, C.1    Waters, B.2
  • 25
    • 33745571012 scopus 로고    scopus 로고
    • On lattices, learning with errors, random linear codes, and cryptography
    • Gabow, H.N., Fagin, R. (eds.) ACM, New York
    • Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: Gabow, H.N., Fagin, R. (eds.) STOC, pp. 84-93. ACM, New York (2005)
    • (2005) STOC , pp. 84-93
    • Regev, O.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.