{"citation":{"mla":"Kiltz, Eike, et al. A New Randomness Extraction Paradigm for Hybrid Encryption. Vol. 5479, Springer, 2009, pp. 590–609, doi:10.1007/978-3-642-01001-9_34.","ama":"Kiltz E, Pietrzak KZ, Stam M, Yung M. A new randomness extraction paradigm for hybrid encryption. In: Vol 5479. Springer; 2009:590-609. doi:10.1007/978-3-642-01001-9_34","ista":"Kiltz E, Pietrzak KZ, Stam M, Yung M. 2009. A new randomness extraction paradigm for hybrid encryption. EUROCRYPT: Theory and Applications of Cryptographic Techniques, LNCS, vol. 5479, 590–609.","apa":"Kiltz, E., Pietrzak, K. Z., Stam, M., & Yung, M. (2009). A new randomness extraction paradigm for hybrid encryption (Vol. 5479, pp. 590–609). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Springer. https://doi.org/10.1007/978-3-642-01001-9_34","short":"E. Kiltz, K.Z. Pietrzak, M. Stam, M. Yung, in:, Springer, 2009, pp. 590–609.","chicago":"Kiltz, Eike, Krzysztof Z Pietrzak, Martijn Stam, and Moti Yung. “A New Randomness Extraction Paradigm for Hybrid Encryption,” 5479:590–609. Springer, 2009. https://doi.org/10.1007/978-3-642-01001-9_34.","ieee":"E. Kiltz, K. Z. Pietrzak, M. Stam, and M. Yung, “A new randomness extraction paradigm for hybrid encryption,” presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, 2009, vol. 5479, pp. 590–609."},"year":"2009","type":"conference","publisher":"Springer","conference":{"name":"EUROCRYPT: Theory and Applications of Cryptographic Techniques"},"doi":"10.1007/978-3-642-01001-9_34","status":"public","day":"28","_id":"3230","publication_status":"published","title":"A new randomness extraction paradigm for hybrid encryption","intvolume":" 5479","author":[{"last_name":"Kiltz","first_name":"Eike","full_name":"Kiltz, Eike"},{"id":"3E04A7AA-F248-11E8-B48F-1D18A9856A87","last_name":"Pietrzak","full_name":"Krzysztof Pietrzak","first_name":"Krzysztof Z","orcid":"0000-0002-9139-1654"},{"full_name":"Stam, Martijn","first_name":"Martijn","last_name":"Stam"},{"last_name":"Yung","full_name":"Yung, Moti","first_name":"Moti"}],"quality_controlled":0,"publist_id":"3449","month":"05","abstract":[{"lang":"eng","text":"We present a new approach to the design of IND-CCA2 secure hybrid encryption schemes in the standard model. Our approach provides an efficient generic transformation from 1-universal to 2-universal hash proof systems. The transformation involves a randomness extractor based on a 4-wise independent hash function as the key derivation function. Our methodology can be instantiated with efficient schemes based on standard intractability assumptions such as Decisional Diffie-Hellman, Quadratic Residuosity, and Paillier's Decisional Composite Residuosity. Interestingly, our framework also allows to prove IND-CCA2 security of a hybrid version of 1991's Damgård's ElGamal public-key encryption scheme under the DDH assumption. "}],"page":"590 - 609","date_published":"2009-05-28T00:00:00Z","volume":5479,"date_created":"2018-12-11T12:02:09Z","date_updated":"2021-01-12T07:41:58Z","extern":1,"alternative_title":["LNCS"]}