2016
DOI: 10.1007/978-3-662-53890-6_11
|View full text |Cite
|
Sign up to set email alerts
|

Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 16 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…This paper constitutes an extended full version of [17]. The new results in this paper are as follows.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…This paper constitutes an extended full version of [17]. The new results in this paper are as follows.…”
Section: Methodsmentioning
confidence: 99%
“…Roughly speaking, the problem of their security reduction is that there is no efficient way for the DDH adversary to convert the forgery provided by the INT-F aff -RKA adversary to a decision bit for solving the DDH problem, since it has no trapdoor. See our conference version [17] for details. The failure of AE's INT-F aff -RKA security reduction directly affects the validity of LLJ's KDM[F aff ]-CCA security proof.…”
Section: Kdm[f]-cca Securitymentioning
confidence: 99%
“…A first attempt of KDM-CCA security without pairings was made by Lu et al [79]. Han et al [60] identified a bug in [79] and gave a patch using the same methodology. They obtained KDM-CCA security for bounded-degree polynomial functions under the DDH and DCR assumptions.…”
Section: Related Workmentioning
confidence: 99%