-
1
-
-
84859985296
-
Standard Security Does Not Imply Security against Selective-Opening
-
Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. Springer, Heidelberg
-
Bellare, M., Dowsley, R., Waters, B., Yilek, S.: Standard Security Does Not Imply Security against Selective-Opening. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 645-662. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7237
, pp. 645-662
-
-
Bellare, M.1
Dowsley, R.2
Waters, B.3
Yilek, S.4
-
2
-
-
84861708459
-
On Definitions of Selective Opening Security
-
Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. Springer, Heidelberg
-
Böhl, F., Hofheinz, D., Kraschewski, D.: On Definitions of Selective Opening Security. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 522-539. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7293
, pp. 522-539
-
-
Böhl, F.1
Hofheinz, D.2
Kraschewski, D.3
-
3
-
-
67650685947
-
Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
-
Bellare, M., Hofheinz, D., Yilek, S.: Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 1-35. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 1-35
-
-
Bellare, M.1
Hofheinz, D.2
Yilek, S.3
-
4
-
-
79953232002
-
Identity-Based Encryption Secure against Selective Opening Attack
-
Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
-
Bellare, M., Waters, B., Yilek, S.: Identity-Based Encryption Secure against Selective Opening Attack. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 235-252. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6597
, pp. 235-252
-
-
Bellare, M.1
Waters, B.2
Yilek, S.3
-
5
-
-
0029723583
-
Adaptively secure multi-party computation
-
ACM Press, New York
-
Canetti, R., Friege, U., Goldreich, O., Naor, M.: Adaptively secure multi-party computation. In: 28th ACM STOC, pp. 639-648. ACM Press, New York (1996)
-
(1996)
28th ACM STOC
, pp. 639-648
-
-
Canetti, R.1
Friege, U.2
Goldreich, O.3
Naor, M.4
-
6
-
-
84947267092
-
Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption
-
Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
-
Cramer, R., Shoup, V.: Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 45-64. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 45-64
-
-
Cramer, R.1
Shoup, V.2
-
7
-
-
77954642903
-
Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
-
Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
-
Fehr, S., Hofheinz, D., Kiltz, E., Wee, H.: Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 381-402. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6110
, pp. 381-402
-
-
Fehr, S.1
Hofheinz, D.2
Kiltz, E.3
Wee, H.4
-
8
-
-
84859476098
-
Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack
-
Ryan,M.D., Smyth, B.,Wang, G. (eds.) ISPEC 2012. Springer, Heidelberg
-
Gao, C.-Z., Xie, D.,Wei, B.: Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack. In: Ryan,M.D., Smyth, B.,Wang, G. (eds.) ISPEC 2012. LNCS, vol. 7232, pp. 46-62. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7232
, pp. 46-62
-
-
Gao, C.-Z.1
Xie, D.2
Wei, B.3
-
9
-
-
84860009205
-
All-But-Many Lossy Trapdoor Functions
-
Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. Springer, Heidelberg
-
Hofheinz, D.: All-But-Many Lossy Trapdoor Functions. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 209-227. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7237
, pp. 209-227
-
-
Hofheinz, D.1
-
10
-
-
82955177043
-
Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security
-
Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. Springer, Heidelberg
-
Hemenway, B., Libert, B., Ostrovsky, R., Vergnaud, D.: Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 70-88. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.7073
, pp. 70-88
-
-
Hemenway, B.1
Libert, B.2
Ostrovsky, R.3
Vergnaud, D.4
-
11
-
-
84873944826
-
Sender equivocable encryption schemes secure against chosen-ciphertext attacks revisited
-
ePrint Archive, Report 2012/473
-
Huang, Z., Liu, S., Qin, B.: Sender equivocable encryption schemes secure against chosen-ciphertext attacks revisited. Cryptology ePrint Archive, Report 2012/473 (2012)
-
(2012)
Cryptology
-
-
Huang, Z.1
Liu, S.2
Qin, B.3
-
12
-
-
77952365380
-
Bit encryption is complete
-
IEEE Computer Society Press
-
Myers, S., Shelat, A.: Bit encryption is complete. In: FOCS 2009, pp. 607-616. IEEE Computer Society Press (2009)
-
(2009)
FOCS 2009
, pp. 607-616
-
-
Myers, S.1
Shelat, A.2
-
13
-
-
51849152661
-
Lossy trapdoor functions and their applications
-
ACM, New York
-
Peikert, C., Waters, B.: Lossy trapdoor functions and their applications. In: STOC 2008, pp. 187-196. ACM, New York (2008)
-
(2008)
STOC 2008
, pp. 187-196
-
-
Peikert, C.1
Waters, B.2
|