ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
16
views
41
references
Top references
cited by
10
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,687
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology – CRYPTO 2010
Efficient Chosen-Ciphertext Security via Extractable Hash Proofs
other
Author(s):
Hoeteck Wee
Publication date
(Print):
2010
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Further versions
open (via free pdf)
Powered by
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Security and Safety (S&S)
Most cited references
41
Record
: found
Abstract
: not found
Book Chapter
: not found
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack
Ronald Cramer
,
Victor Shoup
(1998)
0
comments
Cited
177
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Probabilistic encryption
Shafi Goldwasser
,
Silvio Micali
(1984)
0
comments
Cited
124
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
A hard-core predicate for all one-way functions
O Goldreich
,
L A Levin
(1989)
0
comments
Cited
104
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2010
Pages
: 314-332
DOI:
10.1007/978-3-642-14623-7_17
SO-VID:
eb284efe-8ce1-49ce-b7cd-033e9c89c622
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability
pp. 21
Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks
pp. 707
On the Efficiency of Classical and Quantum Oblivious Transfer Reductions
pp. 41
Protecting Cryptographic Keys against Continual Leakage
pp. 59
Securing Computation against Continuous Leakage
pp. 80
An Efficient and Parallel Gaussian Sampler for Lattices
pp. 98
Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE
pp. 116
Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness
pp. 138
Additively Homomorphic Encryption with d-Operand Multiplications
pp. 155
i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits
pp. 209
Structure-Preserving Signatures and Commitments to Group Elements
pp. 314
Efficient Chosen-Ciphertext Security via Extractable Hash Proofs
pp. 351
Correcting Errors in RSA Private Keys
pp. 393
A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony
pp. 538
Protocols for Multiparty Coin Toss with Dishonest Majority
pp. 558
Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost
pp. 613
On Generalized Feistel Networks
pp. 631
Cryptographic Extraction and Key Derivation: The HKDF Scheme
pp. 649
Time Space Tradeoffs for Attacks against One-Way Functions and PRGs
pp. 666
Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks
pp. 685
Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries
pp. 724
Sampling in a Quantum Population, and Applications
Similar content
3,687
Margaret McCartney: Pity the NHS—Jeremy Hunt has chosen the nuclear option
Authors:
Margaret McCartney
Expression of chosen cell cycle and proliferation markers in pancreatic intraepithelial neoplasia
Authors:
Justyna Zińczuk
,
Konrad Zareba
,
Katarzyna Guzińska-Ustymowicz
…
Research and Implementation of Cross-Chain Transaction Model Based on Improved Hash-Locking
Authors:
Bingrong Dai
,
Shengming Jiang
,
Menglu Zhu
…
See all similar
Cited by
10
Secure Integration of Asymmetric and Symmetric Encryption Schemes
Authors:
Eiichiro Fujisaki
,
Tatsuaki Okamoto
Public Key Encryption against Related Key Attacks
Authors:
Hoeteck Wee
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
Authors:
Benoit Libert
,
Kenneth G. Paterson
,
Elizabeth Quaglia
See all cited by