메뉴 건너뛰기




Volumn 7293 LNCS, Issue , 2012, Pages 522-539

On definitions of selective opening security

Author keywords

public key encryption; security definitions; selective opening security

Indexed keywords

CIPHERTEXTS; ENCRYPTION SECURITY; PLAINTEXT; PUBLIC-KEY ENCRYPTION; PUBLIC-KEY ENCRYPTION SCHEME; SECURITY DEFINITIONS; SECURITY NOTION; SELECTIVE OPENING SECURITY; SIMULATION-BASED;

EID: 84861708459     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-30057-8_31     Document Type: Conference Paper
Times cited : (48)

References (17)
  • 1
    • 67650685947 scopus 로고    scopus 로고
    • Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
    • Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
    • Bellare, M., Hofheinz, D., Yilek, S.: Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 1-35. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 1-35
    • Bellare, M.1    Hofheinz, D.2    Yilek, S.3
  • 2
    • 84859985296 scopus 로고    scopus 로고
    • Standard Security Does Not Imply Security against Selective-Opening
    • Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. Springer, Heidelberg
    • Bellare, M., Dowsley, R., Waters, B., Yilek, S.: Standard Security Does Not Imply Security against Selective-Opening. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 645-662. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7237 , pp. 645-662
    • Bellare, M.1    Dowsley, R.2    Waters, B.3    Yilek, S.4
  • 3
    • 84952324553 scopus 로고    scopus 로고
    • On definitions of selective opening security
    • ePrint Archive 678
    • Böhl, F., Hofheinz, D., Kraschewski, D.: On definitions of selective opening security. IACR Cryptology ePrint Archive 678 (2011)
    • (2011) IACR Cryptology
    • Böhl, F.1    Hofheinz, D.2    Kraschewski, D.3
  • 5
    • 84958626761 scopus 로고    scopus 로고
    • Deniable Encryption
    • Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
    • Canetti, R., Dwork, C., Naor, M., Ostrovsky, R.: Deniable Encryption. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 90-104. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 90-104
    • Canetti, R.1    Dwork, C.2    Naor, M.3    Ostrovsky, R.4
  • 6
    • 84937437506 scopus 로고    scopus 로고
    • Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor
    • Yung, M. (ed.) CRYPTO 2002. Springer, Heidelberg
    • Damgård, I., Nielsen, J.B.: Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 581-596. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 581-596
    • Damgård, I.1    Nielsen, J.B.2
  • 7
    • 33745545274 scopus 로고    scopus 로고
    • On the existence of statistically hiding bit commitment schemes and fail-stop signatures
    • Damgård, I., Pedersen, T.P., Pfitzmann, B.: On the existence of statistically hiding bit commitment schemes and fail-stop signatures. Journal of Cryptology 10(3), 163-194 (1997)
    • (1997) Journal of Cryptology , vol.10 , Issue.3 , pp. 163-194
    • Damgård, I.1    Pedersen, T.P.2    Pfitzmann, B.3
  • 9
    • 77954642903 scopus 로고    scopus 로고
    • Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
    • Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
    • Fehr, S., Hofheinz, D., Kiltz, E., Wee, H.: Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 381-402. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 381-402
    • Fehr, S.1    Hofheinz, D.2    Kiltz, E.3    Wee, H.4
  • 11
    • 40249112675 scopus 로고    scopus 로고
    • Finding collisions in interactive protocols - A tight lower bound on the round complexity of statistically-hiding commitments
    • IEEE Computer Society Press October
    • Haitner, I., Hoch, J.J., Reingold, O., Segev, G.: Finding collisions in interactive protocols - a tight lower bound on the round complexity of statistically-hiding commitments. In: 48th Annual Symposium on Foundations of Computer Science, pp. 669-679. IEEE Computer Society Press (October 2007)
    • (2007) 48th Annual Symposium on Foundations of Computer Science , pp. 669-679
    • Haitner, I.1    Hoch, J.J.2    Reingold, O.3    Segev, G.4
  • 12
    • 77954636265 scopus 로고    scopus 로고
    • Statistically hiding commitments and statistical zero-knowledge arguments from any one-way function
    • Haitner, I., Nguyen, M.-H., Ong, S.J., Reingold, O., Vadhan, S.P.: Statistically hiding commitments and statistical zero-knowledge arguments from any one-way function. SIAM J. Comput. 39(3), 1153-1218 (2009)
    • (2009) SIAM J. Comput. , vol.39 , Issue.3 , pp. 1153-1218
    • Haitner, I.1    Nguyen, M.-H.2    Ong, S.J.3    Reingold, O.4    Vadhan, S.P.5
  • 13
    • 82955177043 scopus 로고    scopus 로고
    • Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security
    • Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. Springer, Heidelberg
    • Hemenway, B., Libert, B., Ostrovsky, R., Vergnaud, D.: Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 70-88. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.7073 , pp. 70-88
    • Hemenway, B.1    Libert, B.2    Ostrovsky, R.3    Vergnaud, D.4
  • 14
    • 84860009205 scopus 로고    scopus 로고
    • All-But-Many Lossy Trapdoor Functions
    • Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. Springer, Heidelberg
    • Hofheinz, D.: All-But-Many Lossy Trapdoor Functions. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 209-227. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7237 , pp. 209-227
    • Hofheinz, D.1
  • 15
    • 0024867751 scopus 로고
    • Universal one-way hash functions and their cryptographic applications
    • ACM Press May
    • Naor, M., Yung, M.: Universal one-way hash functions and their cryptographic applications. In: 21st Annual ACM Symposium on Theory of Computing, pp. 33-43. ACM Press (May 1989)
    • (1989) 21st Annual ACM Symposium on Theory of Computing , pp. 33-43
    • Naor, M.1    Yung, M.2
  • 16
    • 84982943258 scopus 로고
    • Non-interactive and Information-Theoretic Secure Verifiable Secret Sharing
    • Feigenbaum, J. (ed.) CRYPTO 1991. Springer, Heidelberg
    • Pedersen, T.P.: Non-interactive and Information-Theoretic Secure Verifiable Secret Sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129-140. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.576 , pp. 129-140
    • Pedersen, T.P.1
  • 17
    • 51849126892 scopus 로고    scopus 로고
    • A Framework for Efficient and Composable Oblivious Transfer
    • Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
    • Peikert, C., Vaikuntanathan, V., Waters, B.: A Framework for Efficient and Composable Oblivious Transfer. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 554-571. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 554-571
    • Peikert, C.1    Vaikuntanathan, V.2    Waters, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.