skip to main content
10.1145/335305.335335acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free Access

Complete characterization of security notions for probabilistic private-key encryption

Published:01 May 2000Publication History
First page image

References

  1. 1.M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A concrete security treatment of symmetric encryption. In 38th Annual Symposium on Foundations of Computer Science, pages 394-403, 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.M. Bellare, A. Desai, D. Pointcheval, and P. P~ogaway. Relations among notions of security for public-key encryption schemes. Advances in Cryptology--CRYPTO '98 Proceedings, Lecture Notes in Computer Science Vol. 1462, H. Krawczyk ed., Springer-Verlag, 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3.M. Bellare and A. Sahai. Non-malleable encryption: equivalence between two notions, and an indistinguishability-based characterization. Advances in Cryptology--CRYPTO '99 Proceedings, Lecture Notes in Computer Science Vol. 1666, M.J. Wiener ed., Springer-Verlag, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4.G. DiCrescenzo, Y. Ishai, and R. Ostrovsky. Noninteractive and non-malleable commitment. In Proceedings of the 30th Annual Symposium on Theory of Computing, pages 141-150, 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.D. Dolev, C. Dwork, and M. Naor. Non-malleable cryptography, in Proceedings of the ~3rd Annual Symposium on Theory of Computing, pages 542-552, 1991. Also: manuscript, December 1998 (to appear: SIAM Journal on Computing).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.O. Goldreich, S. Goldwasser, and S. Micali. How to construct random functions. Journal of the A CM, 33(4): 792-807, 1986.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.O. Goldreich. Foundations of cryptography. Class notes, Spring 1989, Technion University.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.O. Goldreich. A uniform-complexity treatment of encryption and zero-knowledge. Journal of Cryptography, 6: 21-53, 1993. Manuscript, 1998.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.S. Goldwasser and M. Bellare. Lecture notes on cryptography. Manuscript, 1997.]]Google ScholarGoogle Scholar
  10. 10.S. Goldwasser and S. Micali. Probabilistic encryption. Journal of Computer and System Sciences, 28: 270- 299, 1984:]]Google ScholarGoogle ScholarCross RefCross Ref
  11. 11.J. H~tad, R. Impagliazzo, L. Levin, and M. Luby. A pseudorandom generator from any one-way function. SIAM J. on Computing, 28(4): 1364-1396, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12.R. Impagliazzo and M. Luby. One-way functions are essential for complexity-based cryptography. In 30th Annual Symposium on Foundations of Computer Sci. ence, pages 230-235, 1989.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13.J. Katz and M. Yung. Unforgeable encryption and adaptively secure modes of operation. Manuscript, January, 2000.]]Google ScholarGoogle Scholar
  14. 14.M. Luby. Pseudorandomness and cryptographic applications, chapter 14. Princeton University Press, 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. 15.S. Micali, C. Rackoff, and R. Sloan. The notion of security for probabilistic cryptosystems. SIAM J. on Computing, 17(2): 412-426, April 1988.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. 16.M. Naor and M. Yung. Public-key cryptosystems provably secure against chosen ciphertext attacks. In 'Proceedings of the 2~nd Annual A CM Symposium on Theory of Computing, pages 427-437, 1990.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. 17.C. Rackoff and D. Simon. Non-interactive zeroknowledge proof of knowledge and chosen ciphertext attack. Advances in Cryptology--CRYPTO '91 Proceedings, Lecture Notes in Computer Science Vol. 576, J. Feigenbaum ed., Springer-Verlag, 1991.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. 18.A. Sahai. Non-malleable non-interactive zeroknowledge and achieving chosen-ciphertext security. In j Oth Annual Symposium on Foundations of Computer Science, pages 543-553, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. 19.A.C. Yao. Theory and applications of trapdoor functions. In 23rd Annual Symposium on Foundations of Computer Science, pages 80-91, 1982.]]Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Complete characterization of security notions for probabilistic private-key encryption

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          STOC '00: Proceedings of the thirty-second annual ACM symposium on Theory of computing
          May 2000
          756 pages
          ISBN:1581131844
          DOI:10.1145/335305

          Copyright © 2000 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 May 2000

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          STOC '00 Paper Acceptance Rate85of182submissions,47%Overall Acceptance Rate1,469of4,586submissions,32%

          Upcoming Conference

          STOC '24
          56th Annual ACM Symposium on Theory of Computing (STOC 2024)
          June 24 - 28, 2024
          Vancouver , BC , Canada

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader