DOI: 10.1007/978-3-540-79263-5_15
|View full text |Cite
|
Sign up to set email alerts
|

Public-Key Encryption with Non-interactive Opening

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
40
0

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 38 publications
(40 citation statements)
references
References 15 publications
0
40
0
Order By: Relevance
“…As a consequence, for invalid ciphertexts "the coins used to construct C" might not be well defined. Indeed, we show in Section 4.1 how the (apparently) straightforward construction of PKENO out of PKEWR fails to provide security in the sense of [DHKT08]. This then motivates the quest for both new generic and concrete constructions for PKENO.…”
Section: Our Contributionsmentioning
confidence: 91%
See 4 more Smart Citations
“…As a consequence, for invalid ciphertexts "the coins used to construct C" might not be well defined. Indeed, we show in Section 4.1 how the (apparently) straightforward construction of PKENO out of PKEWR fails to provide security in the sense of [DHKT08]. This then motivates the quest for both new generic and concrete constructions for PKENO.…”
Section: Our Contributionsmentioning
confidence: 91%
“…Damgård et al [DHKT08] showed that a PKENO can be built out of Identity-Based Encryption (IBE). Although IBE can now be realized under a variety of assumptions and without bilinear maps (see [BGH07,GPV08,AB09,CHK09,Pei09] for instance), it remains a very specialized and powerful cryptographic primitive.…”
Section: Our Contributionsmentioning
confidence: 99%
See 3 more Smart Citations