Automated analysis of cryptographic assumptions in generic group models (Q2423840): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(6 intermediate revisions by 4 users not shown)
Property / author
 
Property / author: John C. Mitchell / rank
Normal rank
 
Property / author
 
Property / author: Andrej Scedrov / rank
Normal rank
 
Property / author
 
Property / author: John C. Mitchell / rank
 
Normal rank
Property / author
 
Property / author: Andrej Scedrov / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: SageMath / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: z3 / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s00145-018-9302-3 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W3194642185 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536407 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Financial Cryptography and Data Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical functional encryption for quadratic functions with applications to predicate encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automated Reasoning / rank
 
Normal rank
Property / cites work
 
Property / cites work: Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds / rank
 
Normal rank
Property / cites work
 
Property / cites work: Types for Proofs and Programs / rank
 
Normal rank
Property / cites work
 
Property / cites work: The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security Protocol Verification: Symbolic and Computational Models / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hierarchical Identity Based Encryption with Constant Size Ciphertext / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783728 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Uber-Assumption Family / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3139838 / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Algebraic Framework for Diffie-Hellman Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups / rank
 
Normal rank
Property / cites work
 
Property / cites work: Witness encryption and its applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Structure-Preserving Signatures on Equivalence Classes and Their Application to Anonymous Credentials / rank
 
Normal rank
Property / cites work
 
Property / cites work: Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Semi-Generic Group Model and Applications to Pairing-Based Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Equivalence of Generic Group Models / rank
 
Normal rank
Property / cites work
 
Property / cites work: Solving Non-linear Arithmetic / rank
 
Normal rank
Property / cites work
 
Property / cites work: Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products / rank
 
Normal rank
Property / cites work
 
Property / cites work: Predicate encryption supporting disjunctions, polynomial equations, and inner products / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4949336 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5613949 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptography and Coding / rank
 
Normal rank
Property / cites work
 
Property / cites work: Diffie-Hellman Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Complexity of a determinate algorithm for the discrete logarithm / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Solution of a problem of Tarski / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Probabilistic Algorithms for Verification of Polynomial Identities / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Note on Chosen-Basis Decisional Diffie-Hellman Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3851616 / rank
 
Normal rank

Latest revision as of 15:41, 19 July 2024

scientific article
Language Label Description Also known as
English
Automated analysis of cryptographic assumptions in generic group models
scientific article

    Statements

    Automated analysis of cryptographic assumptions in generic group models (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    20 June 2019
    0 references
    0 references
    generic group model
    0 references
    cryptographic assumptions
    0 references
    automated methods
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references