搜索结果: 1-11 共查到“密码学 selective-opening security”相关记录11条 . 查询时间(0.041 秒)
Simulation-Based Selective Opening Security for Receivers under Chosen-Ciphertext Attacks
simulation-based security selective opening security for receivers chosen-ciphertext attacks
2018/8/21
Security against selective opening attack (SOA) for receivers requires that in a multi-user setting, even if an adversary has access to all ciphertexts, and adaptively corrupts some fraction of the us...
Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption
Identity-based encryption Key dependent message security Receiver selective opening security
2017/10/10
We construct two identity-based encryption (IBE) schemes. The first one is IBE satisfying key dependent message (KDM) security for user secret keys. The second one is IBE satisfying simulation-based r...
Selective Opening Security from Simulatable Data Encapsulation
selective opening hybrid encryption mode of operation
2016/12/10
The confidentiality notion of security against selective opening attacks considers adversaries
that obtain challenge ciphertexts and are allowed to adaptively open them, thereby revealing
the encryp...
Selective-Opening Security in the Presence of Randomness Failures
selective-opening security deterministic encryption nonce-based PKE
2016/12/9
We initiate the study of public-key encryption (PKE) secure against selective-opening attacks (SOA) in
the presence of randomness failures, i.e., when the sender may (inadvertently) use low-quality r...
On the Selective Opening Security of Practical Public-Key Encryption Schemes
public key encryption selective opening security SIM-SO-CCA
2016/4/6
We show that two well-known and widely employed public-key encryption schemes – RSA Optimal
Asymmetric Encryption Padding (RSA-OAEP) and Diffie-Hellman Integrated Encryption Scheme
(DHIES), instanti...
Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts
Public-key encryption selective-opening security lossy encryption
2016/2/24
In a selective-opening (SO) attack on an encryption scheme, an adversary A gets a number of ciphertexts (with possibly related plain- texts), and can then adaptively select a subset of those ciphertex...
Selective Opening Security for Receivers
Selective Opening Attacks Encryption Schemes Non-Committing Encryption
2015/12/23
In a selective opening (SO) attack an adversary breaks into a subset of honestly created ciphertexts
and tries to learn information on the plaintexts of some untouched (but potentially related) ciphe...
On definitions of selective opening security
security definitions selective opening security
2012/6/14
Assume that an adversary observes many ciphertexts, and may then ask for openings, i.e. the plaintext and the randomness used for encryption, of some of them. Do the unopened ciphertexts remain secure...
On definitions of selective opening security
public-key cryptography / security definitions selective opening security public-key encryption
2012/3/20
Assume that an adversary observes many ciphertexts, and may then ask for openings, i.e. the plaintext and the randomness used for encryption, of some of them. Do the unopened ciphertexts remain secure...
On definitions of selective opening security
security definitions selective opening security public-key encryption
2012/8/28
Assume that an adversary observes many ciphertexts, and may then ask for openings, i.e. the plaintext and the randomness used for encryption, of some of them. Do the unopened ciphertexts remain secure...
Re-randomizable Encryption implies Selective Opening Security
Public Key Encryption Commitment Selective Opening
2009/6/12
In this paper, we present new general constructions of commitments and encryptions secure against
a Selective Opening Adversary (SOA). Although it was recognized almost twenty years ago that SOA
sec...