2014
DOI: 10.1007/978-3-642-54631-0_4
|View full text |Cite
|
Sign up to set email alerts
|

Chosen Ciphertext Security via UCE

Abstract: Abstract. Bellare, Hoang, and Keelveedhi (CRYPTO'13) introduced a security notion for a family of (hash) functions called universal computational extractor (UCE), and showed how it can be used to realize various kinds of cryptographic primitives in the standard model whose (efficient) constructions were only known in the random oracle model. Although the results of Bellare et al. have shown that UCEs are quite powerful and useful, the notion of UCE is new, and its potential power and limitation do not seem to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(3 citation statements)
references
References 42 publications
0
3
0
Order By: Relevance
“…In further subsequent work, Matsuda and Hanaoka [102] show that UCE can yield simplifications and efficiency improvements in achieving IND-CCA-secure PKE. In an important advance, Brzuska and Mittelback [51] bring the first non-trivial positive results, showing that certain forms of UCE are achievable assuming iO and AIPO.…”
Section: Perspective and Discussionmentioning
confidence: 96%
“…In further subsequent work, Matsuda and Hanaoka [102] show that UCE can yield simplifications and efficiency improvements in achieving IND-CCA-secure PKE. In an important advance, Brzuska and Mittelback [51] bring the first non-trivial positive results, showing that certain forms of UCE are achievable assuming iO and AIPO.…”
Section: Perspective and Discussionmentioning
confidence: 96%
“…In a recent work Brzuska, Farshim and Mittelbach (BFM; [BFM14]) show that UCE security with respect to computational unpredictability cannot be achieved in the standard model assuming indistinguishability obfuscation exists. Several refinements have been proposed since, including a statistical notion of unpredictability denoted by S sup as well as source classes containing sources that are structurally required to produce output in a special way as well as sources which are restricted to only a fixed number of queries [BHK13b,BFM14,MH14b].…”
Section: Introductionmentioning
confidence: 99%
“…They were able to apply their framework to an interesting and diverse set of security goals, which included among other things, security under key-dependent attacks, security under relatedkey attacks, simultaneous hardcore bits, point-function obfuscation, garbling schemes, proofs of storage, and deterministic encryption. Recently, Matsuda and Hanaoka [MH14] were able to use UCEs to also build CCA-secure public-key encryption schemes.…”
Section: Introductionmentioning
confidence: 99%