Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2014

AUTHORS

K. Preetha Mathew , Sachin Vasant , C. Pandu Rangan

ABSTRACT

In this paper, we propose an IND-CCA2 secure Key-Encapsulation (KEM) in the standard model using the Niederreiter Encryption scheme. Also, we propose a PRIV-1CCA secure deterministic variant of the Niederreiter encryption scheme in the standard model. The security of these constructions are reduced to the hardness of the Syndrome Decoding problem and the Goppa Code Distinguishability problem. To the best of our knowledge, the proposed constructions are the first of its kind under coding-based assumption in the standard model that do not use the \(\kappa \)-repetition paradigm initiated by Rosen and Segev at Theory of Cryptography Conference (TCC), 2009. More... »

PAGES

517-535

References to SciGraph publications

  • 2002. A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order in ADVANCES IN CRYPTOLOGY — ASIACRYPT 2002
  • 2010. More Constructions of Lossy and Correlation-Secure Trapdoor Functions in PUBLIC KEY CRYPTOGRAPHY – PKC 2010
  • 2012. Broadcast Attacks against Code-Based Schemes in RESEARCH IN CRYPTOLOGY
  • 2009. Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE in APPLIED ALGEBRA, ALGEBRAIC ALGORITHMS AND ERROR-CORRECTING CODES
  • 2009. A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model in TOPICS IN CRYPTOLOGY – CT-RSA 2009
  • 2000. Using Hash Functions as a Hedge against Chosen Ciphertext Attack in ADVANCES IN CRYPTOLOGY — EUROCRYPT 2000
  • 2008. Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles in ADVANCES IN CRYPTOLOGY – CRYPTO 2008
  • 2012. A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy in THEORY OF CRYPTOGRAPHY
  • 2013. Secure and Anonymous Hybrid Encryption from Coding Theory in POST-QUANTUM CRYPTOGRAPHY
  • 2012. An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model in INFORMATION SECURITY AND PRIVACY
  • 2009. Chosen-Ciphertext Security via Correlated Products in THEORY OF CRYPTOGRAPHY
  • 1999. Secure Integration of Asymmetric and Symmetric Encryption Schemes in ADVANCES IN CRYPTOLOGY — CRYPTO’ 99
  • 2009. Security Bounds for the Design of Code-Based Cryptosystems in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2009
  • 2004. A New Paradigm of Hybrid Encryption Scheme in ADVANCES IN CRYPTOLOGY – CRYPTO 2004
  • 2007. Deterministic and Efficiently Searchable Encryption in ADVANCES IN CRYPTOLOGY - CRYPTO 2007
  • 2007. Secure Hybrid Encryption from Weakened Key Encapsulation in ADVANCES IN CRYPTOLOGY - CRYPTO 2007
  • 2008. On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles in ADVANCES IN CRYPTOLOGY – CRYPTO 2008
  • 2009. A New Randomness Extraction Paradigm for Hybrid Encryption in ADVANCES IN CRYPTOLOGY - EUROCRYPT 2009
  • 2008. Attacking and Defending the McEliece Cryptosystem in POST-QUANTUM CRYPTOGRAPHY
  • 2008-12. Semantic security for the McEliece cryptosystem without random oracles in DESIGNS, CODES AND CRYPTOGRAPHY
  • 2010. Efficient Lattice (H)IBE in the Standard Model in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2010
  • Book

    TITLE

    Information Security and Cryptology -- ICISC 2013

    ISBN

    978-3-319-12159-8
    978-3-319-12160-4

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-319-12160-4_31

    DOI

    http://dx.doi.org/10.1007/978-3-319-12160-4_31

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1000808725


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Indian Institute of Technology Madras", 
              "id": "https://www.grid.ac/institutes/grid.417969.4", 
              "name": [
                "Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, Chennai, India"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Mathew", 
            "givenName": "K. Preetha", 
            "id": "sg:person.011477357601.15", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011477357601.15"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Boston University", 
              "id": "https://www.grid.ac/institutes/grid.189504.1", 
              "name": [
                "Department of Computer Science, Boston University, Boston, USA"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Vasant", 
            "givenName": "Sachin", 
            "id": "sg:person.013667701201.38", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013667701201.38"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Indian Institute of Technology Madras", 
              "id": "https://www.grid.ac/institutes/grid.417969.4", 
              "name": [
                "Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, Chennai, India"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Rangan", 
            "givenName": "C. Pandu", 
            "id": "sg:person.016366027737.61", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016366027737.61"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/978-3-540-74143-5_30", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1002281087", 
              "https://doi.org/10.1007/978-3-540-74143-5_30"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-74143-5_30", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1002281087", 
              "https://doi.org/10.1007/978-3-540-74143-5_30"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-36178-2_2", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1004409794", 
              "https://doi.org/10.1007/3-540-36178-2_2"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-85174-5_20", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1005613868", 
              "https://doi.org/10.1007/978-3-540-85174-5_20"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-13190-5_28", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1006227741", 
              "https://doi.org/10.1007/978-3-642-13190-5_28"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-13190-5_28", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1006227741", 
              "https://doi.org/10.1007/978-3-642-13190-5_28"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1374376.1374406", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1007533193"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10623-008-9175-9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1009203020", 
              "https://doi.org/10.1007/s10623-008-9175-9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s10623-008-9175-9", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1009203020", 
              "https://doi.org/10.1007/s10623-008-9175-9"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-34159-5_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1009495783", 
              "https://doi.org/10.1007/978-3-642-34159-5_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/73007.73011", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1012580111"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-00862-7_16", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1013524003", 
              "https://doi.org/10.1007/978-3-642-00862-7_16"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-00457-5_25", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1014994053", 
              "https://doi.org/10.1007/978-3-642-00457-5_25"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-00457-5_25", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1014994053", 
              "https://doi.org/10.1007/978-3-642-00457-5_25"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-28628-8_26", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1019461703", 
              "https://doi.org/10.1007/978-3-540-28628-8_26"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-28628-8_26", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1019461703", 
              "https://doi.org/10.1007/978-3-540-28628-8_26"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-28914-9_33", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1024435186", 
              "https://doi.org/10.1007/978-3-642-28914-9_33"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-02181-7_17", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1024990707", 
              "https://doi.org/10.1007/978-3-642-02181-7_17"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-02181-7_17", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1024990707", 
              "https://doi.org/10.1007/978-3-642-02181-7_17"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-13013-7_17", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027369668", 
              "https://doi.org/10.1007/978-3-642-13013-7_17"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-13013-7_17", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027369668", 
              "https://doi.org/10.1007/978-3-642-13013-7_17"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-45539-6_19", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027592044", 
              "https://doi.org/10.1007/3-540-45539-6_19"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-31448-3_13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1029257694", 
              "https://doi.org/10.1007/978-3-642-31448-3_13"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-48405-1_34", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1029403937", 
              "https://doi.org/10.1007/3-540-48405-1_34"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-01001-9_34", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1034390921", 
              "https://doi.org/10.1007/978-3-642-01001-9_34"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-01001-9_34", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1034390921", 
              "https://doi.org/10.1007/978-3-642-01001-9_34"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-10366-7_6", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1034581344", 
              "https://doi.org/10.1007/978-3-642-10366-7_6"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-10366-7_6", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1034581344", 
              "https://doi.org/10.1007/978-3-642-10366-7_6"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-88403-3_3", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1036568485", 
              "https://doi.org/10.1007/978-3-540-88403-3_3"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-88403-3_3", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1036568485", 
              "https://doi.org/10.1007/978-3-540-88403-3_3"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1008731.1008734", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1037229512"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-38616-9_12", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1043250642", 
              "https://doi.org/10.1007/978-3-642-38616-9_12"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-74143-5_31", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1047972824", 
              "https://doi.org/10.1007/978-3-540-74143-5_31"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-74143-5_31", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1047972824", 
              "https://doi.org/10.1007/978-3-540-74143-5_31"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-540-85174-5_19", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1048809352", 
              "https://doi.org/10.1007/978-3-540-85174-5_19"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1109/tit.1975.1055350", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1061647585"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1137/060651380", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1062849070"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1137/s0097539702403773", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1062879362"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2014", 
        "datePublishedReg": "2014-01-01", 
        "description": "In this paper, we propose an IND-CCA2 secure Key-Encapsulation (KEM) in the standard model using the Niederreiter Encryption scheme. Also, we propose a PRIV-1CCA secure deterministic variant of the Niederreiter encryption scheme in the standard model. The security of these constructions are reduced to the hardness of the Syndrome Decoding problem and the Goppa Code Distinguishability problem. To the best of our knowledge, the proposed constructions are the first of its kind under coding-based assumption in the standard model that do not use the \\(\\kappa \\)-repetition paradigm initiated by Rosen and Segev at Theory of Cryptography Conference (TCC), 2009.", 
        "editor": [
          {
            "familyName": "Lee", 
            "givenName": "Hyang-Sook", 
            "type": "Person"
          }, 
          {
            "familyName": "Han", 
            "givenName": "Dong-Guk", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-319-12160-4_31", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": false, 
        "isPartOf": {
          "isbn": [
            "978-3-319-12159-8", 
            "978-3-319-12160-4"
          ], 
          "name": "Information Security and Cryptology -- ICISC 2013", 
          "type": "Book"
        }, 
        "name": "Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model", 
        "pagination": "517-535", 
        "productId": [
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-319-12160-4_31"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "03d9ea3d2c2492eaea5a11213b09d95e83238031de73f329a6ddb176388f2588"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1000808725"
            ]
          }
        ], 
        "publisher": {
          "location": "Cham", 
          "name": "Springer International Publishing", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-319-12160-4_31", 
          "https://app.dimensions.ai/details/publication/pub.1000808725"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-16T00:45", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8700_00000243.jsonl", 
        "type": "Chapter", 
        "url": "http://link.springer.com/10.1007/978-3-319-12160-4_31"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-12160-4_31'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-12160-4_31'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-12160-4_31'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-12160-4_31'


     

    This table displays all metadata directly associated to this object as RDF triples.

    189 TRIPLES      23 PREDICATES      54 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-319-12160-4_31 schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 schema:author N602c347ac3904fe79faaddf4cc92d3ae
    4 schema:citation sg:pub.10.1007/3-540-36178-2_2
    5 sg:pub.10.1007/3-540-45539-6_19
    6 sg:pub.10.1007/3-540-48405-1_34
    7 sg:pub.10.1007/978-3-540-28628-8_26
    8 sg:pub.10.1007/978-3-540-74143-5_30
    9 sg:pub.10.1007/978-3-540-74143-5_31
    10 sg:pub.10.1007/978-3-540-85174-5_19
    11 sg:pub.10.1007/978-3-540-85174-5_20
    12 sg:pub.10.1007/978-3-540-88403-3_3
    13 sg:pub.10.1007/978-3-642-00457-5_25
    14 sg:pub.10.1007/978-3-642-00862-7_16
    15 sg:pub.10.1007/978-3-642-01001-9_34
    16 sg:pub.10.1007/978-3-642-02181-7_17
    17 sg:pub.10.1007/978-3-642-10366-7_6
    18 sg:pub.10.1007/978-3-642-13013-7_17
    19 sg:pub.10.1007/978-3-642-13190-5_28
    20 sg:pub.10.1007/978-3-642-28914-9_33
    21 sg:pub.10.1007/978-3-642-31448-3_13
    22 sg:pub.10.1007/978-3-642-34159-5_1
    23 sg:pub.10.1007/978-3-642-38616-9_12
    24 sg:pub.10.1007/s10623-008-9175-9
    25 https://doi.org/10.1109/tit.1975.1055350
    26 https://doi.org/10.1137/060651380
    27 https://doi.org/10.1137/s0097539702403773
    28 https://doi.org/10.1145/1008731.1008734
    29 https://doi.org/10.1145/1374376.1374406
    30 https://doi.org/10.1145/73007.73011
    31 schema:datePublished 2014
    32 schema:datePublishedReg 2014-01-01
    33 schema:description In this paper, we propose an IND-CCA2 secure Key-Encapsulation (KEM) in the standard model using the Niederreiter Encryption scheme. Also, we propose a PRIV-1CCA secure deterministic variant of the Niederreiter encryption scheme in the standard model. The security of these constructions are reduced to the hardness of the Syndrome Decoding problem and the Goppa Code Distinguishability problem. To the best of our knowledge, the proposed constructions are the first of its kind under coding-based assumption in the standard model that do not use the \(\kappa \)-repetition paradigm initiated by Rosen and Segev at Theory of Cryptography Conference (TCC), 2009.
    34 schema:editor N126d2f579e804554b598c99652279ff1
    35 schema:genre chapter
    36 schema:inLanguage en
    37 schema:isAccessibleForFree false
    38 schema:isPartOf Nd9cdc877833a4586aaa2c6cd2dfbb388
    39 schema:name Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model
    40 schema:pagination 517-535
    41 schema:productId N2bf5b7b66d6441c897326dff2f1815de
    42 N337ce342a2cc4f10b97aa9a4b3483978
    43 Nc86d4845f7dd4e7797898b90a44d0268
    44 schema:publisher N4fa45543318f4433bce5a63fc68755a7
    45 schema:sameAs https://app.dimensions.ai/details/publication/pub.1000808725
    46 https://doi.org/10.1007/978-3-319-12160-4_31
    47 schema:sdDatePublished 2019-04-16T00:45
    48 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    49 schema:sdPublisher Nfbfe1cba73b0435bb5e3b59984d60fdb
    50 schema:url http://link.springer.com/10.1007/978-3-319-12160-4_31
    51 sgo:license sg:explorer/license/
    52 sgo:sdDataset chapters
    53 rdf:type schema:Chapter
    54 N126d2f579e804554b598c99652279ff1 rdf:first Nba8f16f409eb47898f2dc3ce6d093fb0
    55 rdf:rest N166d11c355cc41638530a78caaaf54aa
    56 N166d11c355cc41638530a78caaaf54aa rdf:first N86ea3fddf6ac460cb1df5cdc4bfd9b2e
    57 rdf:rest rdf:nil
    58 N2bf5b7b66d6441c897326dff2f1815de schema:name readcube_id
    59 schema:value 03d9ea3d2c2492eaea5a11213b09d95e83238031de73f329a6ddb176388f2588
    60 rdf:type schema:PropertyValue
    61 N337ce342a2cc4f10b97aa9a4b3483978 schema:name dimensions_id
    62 schema:value pub.1000808725
    63 rdf:type schema:PropertyValue
    64 N4fa45543318f4433bce5a63fc68755a7 schema:location Cham
    65 schema:name Springer International Publishing
    66 rdf:type schema:Organisation
    67 N602c347ac3904fe79faaddf4cc92d3ae rdf:first sg:person.011477357601.15
    68 rdf:rest N8addcdae344e4d70ae6e35ae0f8589e1
    69 N7027fad85bdc473eb80ea90bed998263 rdf:first sg:person.016366027737.61
    70 rdf:rest rdf:nil
    71 N86ea3fddf6ac460cb1df5cdc4bfd9b2e schema:familyName Han
    72 schema:givenName Dong-Guk
    73 rdf:type schema:Person
    74 N8addcdae344e4d70ae6e35ae0f8589e1 rdf:first sg:person.013667701201.38
    75 rdf:rest N7027fad85bdc473eb80ea90bed998263
    76 Nba8f16f409eb47898f2dc3ce6d093fb0 schema:familyName Lee
    77 schema:givenName Hyang-Sook
    78 rdf:type schema:Person
    79 Nc86d4845f7dd4e7797898b90a44d0268 schema:name doi
    80 schema:value 10.1007/978-3-319-12160-4_31
    81 rdf:type schema:PropertyValue
    82 Nd9cdc877833a4586aaa2c6cd2dfbb388 schema:isbn 978-3-319-12159-8
    83 978-3-319-12160-4
    84 schema:name Information Security and Cryptology -- ICISC 2013
    85 rdf:type schema:Book
    86 Nfbfe1cba73b0435bb5e3b59984d60fdb schema:name Springer Nature - SN SciGraph project
    87 rdf:type schema:Organization
    88 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    89 schema:name Information and Computing Sciences
    90 rdf:type schema:DefinedTerm
    91 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    92 schema:name Data Format
    93 rdf:type schema:DefinedTerm
    94 sg:person.011477357601.15 schema:affiliation https://www.grid.ac/institutes/grid.417969.4
    95 schema:familyName Mathew
    96 schema:givenName K. Preetha
    97 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011477357601.15
    98 rdf:type schema:Person
    99 sg:person.013667701201.38 schema:affiliation https://www.grid.ac/institutes/grid.189504.1
    100 schema:familyName Vasant
    101 schema:givenName Sachin
    102 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013667701201.38
    103 rdf:type schema:Person
    104 sg:person.016366027737.61 schema:affiliation https://www.grid.ac/institutes/grid.417969.4
    105 schema:familyName Rangan
    106 schema:givenName C. Pandu
    107 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016366027737.61
    108 rdf:type schema:Person
    109 sg:pub.10.1007/3-540-36178-2_2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1004409794
    110 https://doi.org/10.1007/3-540-36178-2_2
    111 rdf:type schema:CreativeWork
    112 sg:pub.10.1007/3-540-45539-6_19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1027592044
    113 https://doi.org/10.1007/3-540-45539-6_19
    114 rdf:type schema:CreativeWork
    115 sg:pub.10.1007/3-540-48405-1_34 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029403937
    116 https://doi.org/10.1007/3-540-48405-1_34
    117 rdf:type schema:CreativeWork
    118 sg:pub.10.1007/978-3-540-28628-8_26 schema:sameAs https://app.dimensions.ai/details/publication/pub.1019461703
    119 https://doi.org/10.1007/978-3-540-28628-8_26
    120 rdf:type schema:CreativeWork
    121 sg:pub.10.1007/978-3-540-74143-5_30 schema:sameAs https://app.dimensions.ai/details/publication/pub.1002281087
    122 https://doi.org/10.1007/978-3-540-74143-5_30
    123 rdf:type schema:CreativeWork
    124 sg:pub.10.1007/978-3-540-74143-5_31 schema:sameAs https://app.dimensions.ai/details/publication/pub.1047972824
    125 https://doi.org/10.1007/978-3-540-74143-5_31
    126 rdf:type schema:CreativeWork
    127 sg:pub.10.1007/978-3-540-85174-5_19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1048809352
    128 https://doi.org/10.1007/978-3-540-85174-5_19
    129 rdf:type schema:CreativeWork
    130 sg:pub.10.1007/978-3-540-85174-5_20 schema:sameAs https://app.dimensions.ai/details/publication/pub.1005613868
    131 https://doi.org/10.1007/978-3-540-85174-5_20
    132 rdf:type schema:CreativeWork
    133 sg:pub.10.1007/978-3-540-88403-3_3 schema:sameAs https://app.dimensions.ai/details/publication/pub.1036568485
    134 https://doi.org/10.1007/978-3-540-88403-3_3
    135 rdf:type schema:CreativeWork
    136 sg:pub.10.1007/978-3-642-00457-5_25 schema:sameAs https://app.dimensions.ai/details/publication/pub.1014994053
    137 https://doi.org/10.1007/978-3-642-00457-5_25
    138 rdf:type schema:CreativeWork
    139 sg:pub.10.1007/978-3-642-00862-7_16 schema:sameAs https://app.dimensions.ai/details/publication/pub.1013524003
    140 https://doi.org/10.1007/978-3-642-00862-7_16
    141 rdf:type schema:CreativeWork
    142 sg:pub.10.1007/978-3-642-01001-9_34 schema:sameAs https://app.dimensions.ai/details/publication/pub.1034390921
    143 https://doi.org/10.1007/978-3-642-01001-9_34
    144 rdf:type schema:CreativeWork
    145 sg:pub.10.1007/978-3-642-02181-7_17 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024990707
    146 https://doi.org/10.1007/978-3-642-02181-7_17
    147 rdf:type schema:CreativeWork
    148 sg:pub.10.1007/978-3-642-10366-7_6 schema:sameAs https://app.dimensions.ai/details/publication/pub.1034581344
    149 https://doi.org/10.1007/978-3-642-10366-7_6
    150 rdf:type schema:CreativeWork
    151 sg:pub.10.1007/978-3-642-13013-7_17 schema:sameAs https://app.dimensions.ai/details/publication/pub.1027369668
    152 https://doi.org/10.1007/978-3-642-13013-7_17
    153 rdf:type schema:CreativeWork
    154 sg:pub.10.1007/978-3-642-13190-5_28 schema:sameAs https://app.dimensions.ai/details/publication/pub.1006227741
    155 https://doi.org/10.1007/978-3-642-13190-5_28
    156 rdf:type schema:CreativeWork
    157 sg:pub.10.1007/978-3-642-28914-9_33 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024435186
    158 https://doi.org/10.1007/978-3-642-28914-9_33
    159 rdf:type schema:CreativeWork
    160 sg:pub.10.1007/978-3-642-31448-3_13 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029257694
    161 https://doi.org/10.1007/978-3-642-31448-3_13
    162 rdf:type schema:CreativeWork
    163 sg:pub.10.1007/978-3-642-34159-5_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1009495783
    164 https://doi.org/10.1007/978-3-642-34159-5_1
    165 rdf:type schema:CreativeWork
    166 sg:pub.10.1007/978-3-642-38616-9_12 schema:sameAs https://app.dimensions.ai/details/publication/pub.1043250642
    167 https://doi.org/10.1007/978-3-642-38616-9_12
    168 rdf:type schema:CreativeWork
    169 sg:pub.10.1007/s10623-008-9175-9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1009203020
    170 https://doi.org/10.1007/s10623-008-9175-9
    171 rdf:type schema:CreativeWork
    172 https://doi.org/10.1109/tit.1975.1055350 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061647585
    173 rdf:type schema:CreativeWork
    174 https://doi.org/10.1137/060651380 schema:sameAs https://app.dimensions.ai/details/publication/pub.1062849070
    175 rdf:type schema:CreativeWork
    176 https://doi.org/10.1137/s0097539702403773 schema:sameAs https://app.dimensions.ai/details/publication/pub.1062879362
    177 rdf:type schema:CreativeWork
    178 https://doi.org/10.1145/1008731.1008734 schema:sameAs https://app.dimensions.ai/details/publication/pub.1037229512
    179 rdf:type schema:CreativeWork
    180 https://doi.org/10.1145/1374376.1374406 schema:sameAs https://app.dimensions.ai/details/publication/pub.1007533193
    181 rdf:type schema:CreativeWork
    182 https://doi.org/10.1145/73007.73011 schema:sameAs https://app.dimensions.ai/details/publication/pub.1012580111
    183 rdf:type schema:CreativeWork
    184 https://www.grid.ac/institutes/grid.189504.1 schema:alternateName Boston University
    185 schema:name Department of Computer Science, Boston University, Boston, USA
    186 rdf:type schema:Organization
    187 https://www.grid.ac/institutes/grid.417969.4 schema:alternateName Indian Institute of Technology Madras
    188 schema:name Theoretical Computer Science Lab, Department of Computer Science and Engineering, Indian Institute of Technology Madras, Chennai, India
    189 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...