Efficient Threshold Encryption from Lossy Trapdoor Functions (Q3102790): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-642-25405-5_11 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W25436544 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Threshold Decryption and Zero-Knowledge Proofs for Lattice-Based Cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Topics in Cryptology – CT-RSA 2006 / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bonsai Trees, or How to Delegate a Lattice Basis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Encryption with Non-interactive Opening / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: More Constructions of Lossy and Correlation-Secure Trapdoor Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: One-Time Signatures and Chameleon Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-key cryptosystems from the worst-case shortest vector problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lossy trapdoor functions and their applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035737 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to share a secret / rank
 
Normal rank
Property / cites work
 
Property / cites work: Securing threshold cryptosystems against chosen ciphertext attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: New hash functions and their use in authentication and set equality / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public Key Cryptography – PKC 2004 / rank
 
Normal rank

Latest revision as of 17:07, 4 July 2024

scientific article
Language Label Description Also known as
English
Efficient Threshold Encryption from Lossy Trapdoor Functions
scientific article

    Statements

    Efficient Threshold Encryption from Lossy Trapdoor Functions (English)
    0 references
    0 references
    0 references
    0 references
    25 November 2011
    0 references
    threshold public key encryption
    0 references
    lossy trapdoor functions
    0 references
    lattices
    0 references

    Identifiers