메뉴 건너뛰기




Volumn 7778 LNCS, Issue , 2013, Pages 369-385

Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited

Author keywords

chosen ciphertext attack; cross authentication code; sender equivocable encryption

Indexed keywords

CHOSEN CIPHERTEXT ATTACK; CIPHERTEXTS; CROSS-AUTHENTICATION CODE; ENCRYPTION SCHEMES; EXPOSED TO; MULTI-BITS; SECURITY GAMES; SECURITY PROOFS; SINGLE-BIT; SUBSTITUTION ATTACK;

EID: 84873945595     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-36362-7_23     Document Type: Conference Paper
Times cited : (31)

References (13)
  • 1
    • 84859985296 scopus 로고    scopus 로고
    • Standard Security Does Not Imply Security against Selective-Opening
    • Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. Springer, Heidelberg
    • Bellare, M., Dowsley, R., Waters, B., Yilek, S.: Standard Security Does Not Imply Security against Selective-Opening. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 645-662. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7237 , pp. 645-662
    • Bellare, M.1    Dowsley, R.2    Waters, B.3    Yilek, S.4
  • 2
    • 84861708459 scopus 로고    scopus 로고
    • On Definitions of Selective Opening Security
    • Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. Springer, Heidelberg
    • Böhl, F., Hofheinz, D., Kraschewski, D.: On Definitions of Selective Opening Security. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 522-539. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7293 , pp. 522-539
    • Böhl, F.1    Hofheinz, D.2    Kraschewski, D.3
  • 3
    • 67650685947 scopus 로고    scopus 로고
    • Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
    • Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
    • Bellare, M., Hofheinz, D., Yilek, S.: Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 1-35. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 1-35
    • Bellare, M.1    Hofheinz, D.2    Yilek, S.3
  • 4
    • 79953232002 scopus 로고    scopus 로고
    • Identity-Based Encryption Secure against Selective Opening Attack
    • Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
    • Bellare, M., Waters, B., Yilek, S.: Identity-Based Encryption Secure against Selective Opening Attack. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 235-252. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6597 , pp. 235-252
    • Bellare, M.1    Waters, B.2    Yilek, S.3
  • 5
    • 0029723583 scopus 로고    scopus 로고
    • Adaptively secure multi-party computation
    • ACM Press, New York
    • Canetti, R., Friege, U., Goldreich, O., Naor, M.: Adaptively secure multi-party computation. In: 28th ACM STOC, pp. 639-648. ACM Press, New York (1996)
    • (1996) 28th ACM STOC , pp. 639-648
    • Canetti, R.1    Friege, U.2    Goldreich, O.3    Naor, M.4
  • 6
    • 84947267092 scopus 로고    scopus 로고
    • Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption
    • Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
    • Cramer, R., Shoup, V.: Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 45-64. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 45-64
    • Cramer, R.1    Shoup, V.2
  • 7
    • 77954642903 scopus 로고    scopus 로고
    • Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks
    • Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
    • Fehr, S., Hofheinz, D., Kiltz, E., Wee, H.: Encryption Schemes Secure against Chosen-Ciphertext Selective Opening Attacks. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 381-402. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 381-402
    • Fehr, S.1    Hofheinz, D.2    Kiltz, E.3    Wee, H.4
  • 8
    • 84859476098 scopus 로고    scopus 로고
    • Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack
    • Ryan,M.D., Smyth, B.,Wang, G. (eds.) ISPEC 2012. Springer, Heidelberg
    • Gao, C.-Z., Xie, D.,Wei, B.: Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack. In: Ryan,M.D., Smyth, B.,Wang, G. (eds.) ISPEC 2012. LNCS, vol. 7232, pp. 46-62. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7232 , pp. 46-62
    • Gao, C.-Z.1    Xie, D.2    Wei, B.3
  • 9
    • 84860009205 scopus 로고    scopus 로고
    • All-But-Many Lossy Trapdoor Functions
    • Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. Springer, Heidelberg
    • Hofheinz, D.: All-But-Many Lossy Trapdoor Functions. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 209-227. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7237 , pp. 209-227
    • Hofheinz, D.1
  • 10
    • 82955177043 scopus 로고    scopus 로고
    • Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security
    • Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. Springer, Heidelberg
    • Hemenway, B., Libert, B., Ostrovsky, R., Vergnaud, D.: Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 70-88. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.7073 , pp. 70-88
    • Hemenway, B.1    Libert, B.2    Ostrovsky, R.3    Vergnaud, D.4
  • 11
    • 84873944826 scopus 로고    scopus 로고
    • Sender equivocable encryption schemes secure against chosen-ciphertext attacks revisited
    • ePrint Archive, Report 2012/473
    • Huang, Z., Liu, S., Qin, B.: Sender equivocable encryption schemes secure against chosen-ciphertext attacks revisited. Cryptology ePrint Archive, Report 2012/473 (2012)
    • (2012) Cryptology
    • Huang, Z.1    Liu, S.2    Qin, B.3
  • 12
    • 77952365380 scopus 로고    scopus 로고
    • Bit encryption is complete
    • IEEE Computer Society Press
    • Myers, S., Shelat, A.: Bit encryption is complete. In: FOCS 2009, pp. 607-616. IEEE Computer Society Press (2009)
    • (2009) FOCS 2009 , pp. 607-616
    • Myers, S.1    Shelat, A.2
  • 13
    • 51849152661 scopus 로고    scopus 로고
    • Lossy trapdoor functions and their applications
    • ACM, New York
    • Peikert, C., Waters, B.: Lossy trapdoor functions and their applications. In: STOC 2008, pp. 187-196. ACM, New York (2008)
    • (2008) STOC 2008 , pp. 187-196
    • Peikert, C.1    Waters, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.