%PDF-1.5 % 1 0 obj << /S /GoTo /D (section.1) >> endobj 4 0 obj (Introduction) endobj 5 0 obj << /S /GoTo /D (subsection.1.1) >> endobj 8 0 obj (Our Contributions) endobj 9 0 obj << /S /GoTo /D (subsection.1.2) >> endobj 12 0 obj (Related Work) endobj 13 0 obj << /S /GoTo /D (subsection.1.3) >> endobj 16 0 obj (Overview of Our Approach) endobj 17 0 obj << /S /GoTo /D (subsection.1.4) >> endobj 20 0 obj (Paper Organization) endobj 21 0 obj << /S /GoTo /D (section.2) >> endobj 24 0 obj (Preliminaries) endobj 25 0 obj << /S /GoTo /D (subsection.2.1) >> endobj 28 0 obj (t-Wise delta-Dependent Permutations) endobj 29 0 obj << /S /GoTo /D (subsection.2.2) >> endobj 32 0 obj (Admissible Hash Functions) endobj 33 0 obj << /S /GoTo /D (subsection.2.3) >> endobj 36 0 obj (Lossy Trapdoor Functions) endobj 37 0 obj << /S /GoTo /D (subsection.2.4) >> endobj 40 0 obj (Deterministic Public-Key Encryption) endobj 41 0 obj << /S /GoTo /D (section.3) >> endobj 44 0 obj (Formalizing Adaptive Security for Deterministic Public-Key Encryption) endobj 45 0 obj << /S /GoTo /D (subsection.3.1) >> endobj 48 0 obj (Chosen-Plaintext Security) endobj 49 0 obj << /S /GoTo /D (subsection.3.2) >> endobj 52 0 obj (Chosen-Ciphertext Security) endobj 53 0 obj << /S /GoTo /D (section.4) >> endobj 56 0 obj (Deterministic Extraction via a High-Moment Crooked Leftover Hash Lemma) endobj 57 0 obj << /S /GoTo /D (subsection.4.1) >> endobj 60 0 obj (A High-Moment Crooked Leftover Hash Lemma) endobj 61 0 obj << /S /GoTo /D (subsection.4.2) >> endobj 64 0 obj (Generalization to Block Sources) endobj 65 0 obj << /S /GoTo /D (subsection.4.3) >> endobj 68 0 obj (Proof of Claim 4.2) endobj 69 0 obj << /S /GoTo /D (section.5) >> endobj 72 0 obj (Chosen-Plaintext Security based on Lossy Trapdoor Functions) endobj 73 0 obj << /S /GoTo /D (section.6) >> endobj 76 0 obj (R-Lossy Trapdoor Functions) endobj 77 0 obj << /S /GoTo /D (subsection.6.1) >> endobj 80 0 obj (The Relation RBM) endobj 81 0 obj << /S /GoTo /D (subsection.6.2) >> endobj 84 0 obj (Constructing RBM-Lossy Trapdoor Functions) endobj 85 0 obj << /S /GoTo /D (section.7) >> endobj 88 0 obj (Chosen-Ciphertext Security based on R-Lossy Trapdoor Functions) endobj 89 0 obj << /S /GoTo /D (section.8) >> endobj 92 0 obj (Generic Constructions in the Random-Oracle Model) endobj 93 0 obj << /S /GoTo /D (subsection.8.1) >> endobj 96 0 obj (A Construction Secure Against 2p-Bounded \(T,k\)-Source Adversaries) endobj 97 0 obj << /S /GoTo /D (subsection.8.2) >> endobj 100 0 obj (A Construction Secure Against q-Query \(T,k\)-Source Adversaries) endobj 101 0 obj << /S /GoTo /D (equation.8.6) >> endobj 104 0 obj (Acknowledgements) endobj 105 0 obj << /S /GoTo /D (section*.2) >> endobj 108 0 obj (References) endobj 109 0 obj << /S /GoTo /D [110 0 R /FitH] >> endobj 112 0 obj << /Length 3794 /Filter /FlateDecode >> stream xڝZrܸ}WSLUyhwnU֫vԮKV*4sH+sĕ h4FnPb?=7^^|a06YCXy&QY/FozuL8xmQU0]{?-@X,cV1w]/̯/