Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,760,061 papers from all fields of science
Search
Sign In
Create Free Account
RCCA Security
Replayable security against Chosen-Ciphertext Attack (noted 'RCCA') is a security notion in cryptography that relaxes the older notion of Security…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
2 relations
Broader (1)
Computer security
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
LARA - A Design Concept for Lattice-based Encryption
Rachid El Bansarkhani
IACR Cryptology ePrint Archive
2019
Corpus ID: 31586101
Lattice-based encryption schemes still suffer from a low message throughput per ciphertext and inefficient solutions towards…
Expand
2019
2019
Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms
Yuan Chen
,
Qingkuan Dong
,
Yannan Li
,
Qiqi Lai
,
Zhedong Wang
Journal of universal computer science (Online)
2019
Corpus ID: 150383602
The existence of natural public-key encryption (PKE) schemes satisfying secretly detectable replayable CCA (sd-RCCA) security is…
Expand
2018
2018
A Construction of Cramer-Shoup Like Encryption Protocols Based on the Anshel-Anshel-Goldfeld Key Exchange Protocol
Shuji Isobe
,
Jun-ya Iwazaki
,
E. Koizumi
,
Atsushi Suda
Sixth International Symposium on Computing and…
2018
Corpus ID: 57191441
We propose a secure encryption protocol on non-abelian groups. We follow the line of the construction of the Cramer-Shoup…
Expand
2017
2017
Natural sd-RCCA Secure Public-Key Encryptions
Yuan Chen
,
Qingkuan Dong
,
Qiqi Lai
Provable Security
2017
Corpus ID: 26943338
Replayable CCA (RCCA) security is a reasonable relaxation of CCA security for public-key encryptions. Pd-RCCA and sd-RCCA…
Expand
2014
2014
RCCA security for KEM+DEM style hybrid encryptions and a general hybrid paradigm from RCCA-secure KEMs to CCA-secure encryptions
Chen Yuan
,
Dong Qing-kuan
2014
Corpus ID: 195592133
Replayable chosen-ciphertext attack RCCA security is a weaker notion than chosen-ciphertext attack CCA security and has been…
Expand
2014
2014
RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security
R. Lu
,
Xiaodong Lin
,
Jun Shao
,
K. Liang
Provable Security
2014
Corpus ID: 9563076
Bidirectional proxy re-encryption allows ciphertext transformation between Alice and Bob via a semi-trusted proxy, who however…
Expand
2014
2014
A Proxy Re-Encryption Scheme with the Unforgeability of Re-Encryption Keys against Collusion Attacks
Ryotaro Hayashi
,
Tatsuyuki Matsushita
IACR Cryptology ePrint Archive
2014
Corpus ID: 18570511
Proxy re-encryption (PRE) schemes are cryptosystems which allow a proxy who has a reencryption key to convert a ciphertext…
Expand
2012
2012
RCCA security for KEM+DEM style hybrid encryptions and a general hybrid paradigm from RCCA-secure KEMs to CCA-secure encryptions
Yuan Chen
,
Qingkuan Dong
Secur. Commun. Networks
2012
Corpus ID: 36512501
RCCA security is a weaker notion than CCA security, and has been proven to be sufficient for several cryptographic tasks. This…
Expand
2009
2009
Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption
Yusuke Kawamoto
,
Hideki Sakurada
,
M. Hagiya
Formal to Practical Security
2009
Corpus ID: 17892829
Rerandomizing ciphertexts plays an important role in protecting privacy in security protocols such as mixnets. We investigate the…
Expand
2007
2007
Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions
Rui Xue
,
D. Feng
International Conference on Information…
2007
Corpus ID: 36939993
Replayable adaptively chosen ciphertext attack (RCCA) security is a relaxation of popular adaptively chosen ciphertext attack…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required