An efficient IND-CCA2 secure variant of the niederreiter encryption scheme in the standard model
Citations
320 citations
93 citations
Cites background from "An efficient IND-CCA2 secure varian..."
...Classical CCA2-secure conversions work in the random oracle model [22, 28], while the problem of finding efficient CCA2-secure conversions of these cryptosystem in the standard model has been addressed more recently [19, 18, 39, 42, 44]....
[...]
44 citations
35 citations
Additional excerpts
...As for IND-CCA2 security, a few promising recent results have been published, for instance by Preetha Mathew, Vasant, Venkatesan and Pandu Rangan [78] at ACISP 2012....
[...]
14 citations
References
889 citations
"An efficient IND-CCA2 secure varian..." refers methods in this paper
...Our scheme uses ideas from [19,18,5]....
[...]
...We use strongly unforgeable one-time signature (OTS) to handle malleability related issues as in [19,23,5]....
[...]
840 citations
"An efficient IND-CCA2 secure varian..." refers background or methods in this paper
...In our case, f1, f2 are the two injective functions that achieve the same purpose, but the details and computations are entirely different from [1]....
[...]
...[1] in the lattice-based setup, for simulation of the key-extraction phase in their proof of CPA security of a (H)IBE in the standard model....
[...]
835 citations
831 citations
"An efficient IND-CCA2 secure varian..." refers background in this paper
...The important notions in public key cryptography are that of security under chosen ciphertext attack (CCA security) and trapdoor functions (TDFs) [7,17,20]....
[...]
...[7]....
[...]
790 citations