ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Chosen Ciphertext Security from Injective Trapdoor Functions
Advances in Cryptology – CRYPTO 2020 - Lecture Notes in Computer Science
◽
10.1007/978-3-030-56784-2_28
◽
2020
◽
pp. 836-866
◽
Cited By ~ 1
Author(s):
Susan Hohenberger
◽
Venkata Koppula
◽
Brent Waters
Keyword(s):
Trapdoor Functions
◽
Chosen Ciphertext Security
Download Full-text
Related Documents
Cited By
References
Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions
Public Key Cryptography – PKC 2010 - Lecture Notes in Computer Science
◽
10.1007/978-3-642-13013-7_18
◽
2010
◽
pp. 296-311
◽
Cited By ~ 28
Author(s):
Petros Mol
◽
Scott Yilek
Keyword(s):
Trapdoor Functions
◽
Chosen Ciphertext Security
◽
Lossy Trapdoor Functions
Download Full-text
Adaptive Trapdoor Functions and Chosen-Ciphertext Security
Advances in Cryptology – EUROCRYPT 2010 - Lecture Notes in Computer Science
◽
10.1007/978-3-642-13190-5_34
◽
2010
◽
pp. 673-692
◽
Cited By ~ 57
Author(s):
Eike Kiltz
◽
Payman Mohassel
◽
Adam O’Neill
Keyword(s):
Trapdoor Functions
◽
Chosen Ciphertext Security
Download Full-text
All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from LWE
Advances in Cryptology – CRYPTO 2017 - Lecture Notes in Computer Science
◽
10.1007/978-3-319-63697-9_12
◽
2017
◽
pp. 332-364
◽
Cited By ~ 16
Author(s):
Benoît Libert
◽
Amin Sakzad
◽
Damien Stehlé
◽
Ron Steinfeld
Keyword(s):
Trapdoor Functions
◽
Chosen Ciphertext Security
◽
Lossy Trapdoor Functions
Download Full-text
From semantic security to chosen ciphertext security
10.31274/etd-180810-2661
◽
2010
◽
Author(s):
Sahnghyun Cha
Keyword(s):
Semantic Security
◽
Chosen Ciphertext Security
Download Full-text
A homomorphic encryption scheme with adaptive chosen ciphertext security but without random oracle
Theoretical Computer Science
◽
10.1016/j.tcs.2015.10.001
◽
2016
◽
Vol 609
◽
pp. 253-261
◽
Cited By ~ 2
Author(s):
Linming Gong
◽
Shundong Li
◽
Qing Mao
◽
Daoshun Wang
◽
Jiawei Dou
Keyword(s):
Homomorphic Encryption
◽
Random Oracle
◽
Encryption Scheme
◽
Chosen Ciphertext Security
◽
Adaptive Chosen Ciphertext Security
Download Full-text
Combiners for Chosen-Ciphertext Security
Lecture Notes in Computer Science - Computing and Combinatorics
◽
10.1007/978-3-319-42634-1_21
◽
2016
◽
pp. 257-268
◽
Cited By ~ 2
Author(s):
Cong Zhang
◽
David Cash
◽
Xiuhua Wang
◽
Xiaoqi Yu
◽
Sherman S. M. Chow
Keyword(s):
Chosen Ciphertext Security
Download Full-text
Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions
Applied Cryptography and Network Security - Lecture Notes in Computer Science
◽
10.1007/978-3-642-13708-2_3
◽
2010
◽
pp. 35-52
◽
Cited By ~ 17
Author(s):
Xavier Boyen
◽
Brent Waters
Keyword(s):
Trapdoor Functions
◽
Lossy Trapdoor Functions
Download Full-text
Efficient Lossy Trapdoor Functions Based on Subgroup Membership Assumptions
Cryptology and Network Security - Lecture Notes in Computer Science
◽
10.1007/978-3-319-02937-5_13
◽
2013
◽
pp. 235-250
◽
Cited By ~ 7
Author(s):
Haiyang Xue
◽
Bao Li
◽
Xianhui Lu
◽
Dingding Jia
◽
Yamin Liu
Keyword(s):
Trapdoor Functions
◽
Lossy Trapdoor Functions
Download Full-text
Enhanced Chosen-Ciphertext Security and Applications
Public-Key Cryptography – PKC 2014 - Lecture Notes in Computer Science
◽
10.1007/978-3-642-54631-0_19
◽
2014
◽
pp. 329-344
◽
Cited By ~ 6
Author(s):
Dana Dachman-Soled
◽
Georg Fuchsbauer
◽
Payman Mohassel
◽
Adam O’Neill
Keyword(s):
Chosen Ciphertext Security
Download Full-text
Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security
Advances in Cryptology – EUROCRYPT 2012 - Lecture Notes in Computer Science
◽
10.1007/978-3-642-29011-4_39
◽
2012
◽
pp. 663-681
◽
Cited By ~ 30
Author(s):
Susan Hohenberger
◽
Allison Lewko
◽
Brent Waters
Keyword(s):
New Approach
◽
Chosen Ciphertext Security
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close