搜索结果: 1-6 共查到“Key dependent message security”相关记录6条 . 查询时间(0.093 秒)
CCA Security and Trapdoor Functions via Key-Dependent-Message Security
chosen ciphertext security trapdoor functions key dependent message security
2019/3/20
We study the relationship among public-key encryption (PKE) satisfying indistinguishability against chosen plaintext attacks (IND-CPA security), that against chosen ciphertext attacks (IND-CCA securit...
Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption
Identity-based encryption Key dependent message security Receiver selective opening security
2017/10/10
We construct two identity-based encryption (IBE) schemes. The first one is IBE satisfying key dependent message (KDM) security for user secret keys. The second one is IBE satisfying simulation-based r...
On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions
public key encryption key dependent message security chosen ciphertext security
2016/3/7
In PKC 1999, Fujisaki and Okamoto showed how to convert any public key encryption
(PKE) scheme secure against chosen plaintext attacks (CPA) to a PKE scheme which is secure against
chosen ciphertext...
Key-Dependent Message Security: Generic Amplification and Completeness Theorems
Key-dependent message cyclic-security randomized encoding
2010/10/11
In this work, we prove the first \emph{generic} KDM amplification theorem which relies solely on the KDM security of the underlying scheme without making any other assumptions. Specifically, we show t...
Bounded Key-Dependent Message Security
KDM/clique/circular security fully homomorphic encryption formal security
2009/11/18
We construct the first public-key encryption scheme that is proven secure (in the standard
model, under standard assumptions) even when the attacker gets access to encryptions
of arbitrary efficient...
Towards Key-Dependent Message Security in the Standard Model
Key-dependent message security security proofs symmetric encryption schemes
2008/5/29
Standard security notions for encryption schemes do not guarantee any security
if the encrypted messages depend on the secret key. Yet it is exactly the stronger notion
of security in the presence o...