18 results with keyword: 'encryption schemes secure against ciphertext selective opening attacks'
(Recall that in a sense, the reason why the lossy encryption paradigm does not mesh well with SO-CCA security is that lossy encryption only pro- vides a handle to turn all
N/A
In the IND-ID-CCA security game of the ex- tractable 1SPO-IBE scheme, B is given a public parameter, and also is provided with an encryp- tion oracle for challenge ciphertext, a
N/A
proposed the first sender equivocable encryption scheme secure against chosen-ciphertext attack (NC-CCA) and proved that NC-CCA security implies secu- rity against selective
N/A
Our first construction, which is constructed from an IND-RSO- CPA secure scheme, an IND-CCA secure scheme, an appropriate NIZK and a one-time signature, is inspired by the paradigm
N/A
Keywords: simulation-based security, selective opening security for receivers, chosen-ciphertext attacks, public-key encryption, identity-based encryption..
N/A
Informally, a public-key encryption scheme is lossy if there is an efficient alternate key generation algorithm (called the “lossy key generation algorithm”) that produces
N/A
In this letter, based on the Gap bilinear Diffie-Hellman problem, we would like to use another padding technique [4] to propose a new ID-based encryption scheme secure against
N/A
In Section 9.5, we study two ex- amples of public-key encryption schemes which are secure against adaptively- chosen-ciphertext attacks, and their security proofs.. One of the
N/A
Kurosawa-Desmedt encryption scheme is a variation of Cramer- Shoup encryption schemes, which are the first practical schemes secure against adaptive chosen ciphertext attack in
N/A
We call it LoR, which is short for “Linear or Random” to represent the fact that in our scheme the encryption of a 0 consists of five group elements whose relationship is similar
N/A
(Briefly, we cannot make the encryption undetectably lossy on all challenge identities because the adversary has an Extract oracle and we wish to achieve full, not selective-id
N/A
Table 7-18: Illustrative Strategy to Attain 0.079 ppm: Estimated Annual Reductions in the Incidence of Premature Mortality Associated with Ozone Exposure in 2020 (Incremental
N/A
Here we only focus on IBKEMs, since, even in the multi-instance, multi-challenge setting, a constrained CCA (resp. CPA) secure IBKEM can be transformed to a CCA (resp. CPA)
N/A
The homomorphic property ensures that the cryptosystems cannot be secure against adaptive chosen ciphertext attacks, since given the encryption of c , the attacker can modify
N/A
Using a public key scheme secure against adaptive chosen ciphertext attacks such as RSA-OAEP [27] together with unauthenticated encryption would be one of the most ironic
N/A
Richer and more advanced lattice-based cryptographic schemes, including chosen ciphertext-secure encryption, “hash-and-sign” digital signatures, and identity-based encryption
N/A
And our scheme is also very simple and its security is based on the EF-AGCD assumption, an assumption which was used in the context of fully homomorphic encryption schemes
N/A