Generalized public-key cryptography with tight security (original) (raw)
Related papers
A New Security Definition for Public Key Encryption Schemes and Its Applications
Efficient Public-Key Cryptography in the Presence of Key Leakage
2010
Public-key encryption in a multi-user setting: Security proofs and improvements
2000
On the Security Notions for Public-Key Encryption Schemes
2004
New security notions and relations for public-key encryption
Journal of Mathematical Cryptology, 2012
On Constructions and Security Notions of Public-key Cryptosystems
Book Chapter, Contemporary Topics in Mathematics and Statistics with Applications, Volume-I, Asian Books Pvt Ltd., 2012
Public Key Encryption Resilient to Post-Challenge Leakage and Tampering Attacks
IACR Cryptol. ePrint Arch., 2018
On the security of public key cryptosystems with a double decryption mechanism
Information Processing Letters, 2008
On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes
Public-Key Cryptography – PKC 2016, 2016
Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries
Lecture Notes in Computer Science, 1999
Easy Verifiable Primitives and Practical Public Key Cryptosystems
Lecture Notes in Computer Science, 2003
Profesore Salem Mohamed Edrah M O H A M E D Edrah
New approach to practical leakage-resilient public-key cryptography
Journal of Mathematical Cryptology
Public-Key Cryptography Theory and Practice
A new public-key cryptosystem as secure as factoring
Lecture Notes in Computer Science, 1998
Public-key encryption with non-interactive opening: New constructions and stronger definitions
Progress in Cryptology …, 2010
Key-Insulated Public Key Cryptosystems
2002
A Generic Construction for Token-Controlled Public Key Encryption
2006
New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes
Public-Key Cryptography – PKC 2018, 2018
2009
On multivariate signature-only public key cryptosystems
IACR Cryptology ePrint Archive, 2001
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with a Counterexample
Lecture Notes in Computer Science, 2017
Public-Key Encryption with Random Oracles
Introduction to Security Reduction, 2018
A new public key encryption scheme based on two cryptographic assumptions
2015
On the security of public key protocols
Information Theory, IEEE Transactions on, 1983
Contribution to Privacy-Preserving Cryptographic Techniques
Securing group key exchange against strong corruptions and key registration attacks
International Journal of Applied Cryptography, 2008
A Practical Public Key Cryptosystem from Paillier and Rabin Schemes
2003
On the security of random key pre-distribution schemes
A Closer Look at PKI: Security and Efficiency
Bogdan Warinschi, Marc Fischlin
Lecture Notes in Computer Science, 2007
Towards an Efficient Public Key Cryptosystem
A Forward-Secure Public-Key Encryption Scheme
Journal of Cryptology, 2007