Sciweavers

255 search results - page 1 / 51
» Security of Encryption Schemes in Weakened Random Oracle Mod...
Sort
View
PKC
2010
Springer
150views Cryptology» more  PKC 2010»
13 years 7 months ago
Security of Encryption Schemes in Weakened Random Oracle Models
Liskov proposed several weakened versions of the random oracle model, called weakened random oracle models (WROMs), to capture the vulnerability of ideal compression functions, wh...
Akinori Kawachi, Akira Numayama, Keisuke Tanaka, K...
CRYPTO
2012
Springer
222views Cryptology» more  CRYPTO 2012»
11 years 6 months ago
Secure Identity-Based Encryption in the Quantum Random Oracle Model
We give the first proof of security for an identity-based encryption scheme in the quantum random oracle model. This is the first proof of security for any scheme in this model ...
Mark Zhandry
CORR
2000
Springer
93views Education» more  CORR 2000»
13 years 3 months ago
The Random Oracle Methodology, Revisited
We take a critical look at the relationship between the security of cryptographic schemes in the Random Oracle Model, and the security of the schemes that result from implementing...
Ran Canetti, Oded Goldreich, Shai Halevi
CRYPTO
2008
Springer
150views Cryptology» more  CRYPTO 2008»
13 years 5 months ago
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
Abstract. The study of deterministic public-key encryption was initiated by Bellare et al. (CRYPTO '07), who provided the "strongest possible" notion of security for...
Alexandra Boldyreva, Serge Fehr, Adam O'Neill