[go: up one dir, main page]

Emura, 2021 - Google Patents

On the security of keyed-homomorphic PKE: preventing key recovery attacks and ciphertext validity attacks

Emura, 2021

View PDF
Document ID
2877085240803750450
Author
Emura K
Publication year
Publication venue
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

External Links

Snippet

On the Security of Keyed-Homomorphic PKE: Preventing Key Recovery Attacks and Ciphertext Validity Attacks Page 1 310 IEICE TRANS. FUNDAMENTALS, VOL.E104–A, NO.1 JANUARY 2021 LETTER On the Security of Keyed-Homomorphic PKE: Preventing Key Recovery Attacks …
Continue reading at www.jstage.jst.go.jp (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Agrawal et al. PASTA: password-based threshold authentication
MacKenzie et al. Networked cryptographic devices resilient to capture
Ding et al. Simple identity-based cryptography with mediated RSA
Chen et al. Improved identity-based signcryption
Boyd et al. Efficient one-round key exchange in the standard model
Chatterjee et al. Another look at tightness
Chen et al. Combined public-key schemes: The case of ABE and ABS
Isshiki et al. Proxy re-encryption in a stronger security model extended from CT-RSA2012
US20050169478A1 (en) Practical non-malleable public-key cryptosystem
Banfi et al. Anamorphic encryption, revisited
MacKenzie et al. Delegation of cryptographic servers for capture-resilient devices
Sahai et al. Fully secure accountable-authority identity-based encryption
Lai et al. Efficient CCA-secure PKE from identity-based techniques
Dent Hybrid cryptography
Emura On the security of keyed-homomorphic PKE: preventing key recovery attacks and ciphertext validity attacks
Zhang et al. An ID-based anonymous signcryption scheme for multiple receivers secure in the standard model
Daza et al. CCA2-secure threshold broadcast encryption with shorter ciphertexts
Selvi et al. Certificateless kem and hybrid signcryption schemes revisited
Guo et al. Towards a secure certificateless proxy re-encryption scheme
Huang et al. Generic certificateless key encapsulation mechanism
Yi et al. ID-Based group password-authenticated key exchange
Sharmila Deva Selvi et al. On the security of identity based ring signcryption schemes
Daza et al. Ad-hoc threshold broadcast encryption with shorter ciphertexts
Venema et al. Using Predicate Extension for Predicate Encryption to Generically Obtain Chosen-Ciphertext Security and Signatures
Lu et al. A certificate-based AKA protocol secure against public key replacement attacks.