Efficient Compilers for After-the-Fact Leakage: From CPA to CCA-2 Secure PKE to AKE

Suvradip Chakraborty, Goutam Paul, C. Pandu Rangan. Efficient Compilers for After-the-Fact Leakage: From CPA to CCA-2 Secure PKE to AKE. In Josef Pieprzyk, Suriadi Suriadi, editors, Information Security and Privacy - 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part I. Volume 10342 of Lecture Notes in Computer Science, pages 343-362, Springer, 2017. [doi]

@inproceedings{ChakrabortyPR17,
  title = {Efficient Compilers for After-the-Fact Leakage: From CPA to CCA-2 Secure PKE to AKE},
  author = {Suvradip Chakraborty and Goutam Paul and C. Pandu Rangan},
  year = {2017},
  doi = {10.1007/978-3-319-60055-0_18},
  url = {https://doi.org/10.1007/978-3-319-60055-0_18},
  researchr = {https://researchr.org/publication/ChakrabortyPR17},
  cites = {0},
  citedby = {0},
  pages = {343-362},
  booktitle = {Information Security and Privacy - 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part I},
  editor = {Josef Pieprzyk and Suriadi Suriadi},
  volume = {10342},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {978-3-319-60055-0},
}