Anonymous IBE, leakage resilience and circular security from new assumptions (Q1648813): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Efficient Lattice (H)IBE in the Standard Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simultaneous Hardcore Bits and Cryptography against Memory Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: More on average case vs approximation complexity / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key-Dependent Message Security: Generic Amplification and Completeness / rank
 
Normal rank
Property / cites work
 
Property / cites work: Breaking generalized Diffie-Hellman modulo a composite is no easier than factoring / rank
 
Normal rank
Property / cites work
 
Property / cites work: Chosen‐Ciphertext Security from Identity‐Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Encryption from the Weil Pairing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bounded Key-Dependent Message Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Circular-Secure Encryption from Decision Diffie-Hellman / rank
 
Normal rank
Property / cites work
 
Property / cites work: Anonymous IBE, leakage resilience and circular security from new assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Worst-case hardness for LPN and cryptographic hashing via code smoothing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4413854 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Laconic oblivious transfer and its applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bonsai trees, or how to delegate a lattice basis / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Identity Based Encryption Scheme Based on Quadratic Residues / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-based encryption from the Diffie-Hellman assumption / rank
 
Normal rank
Property / cites work
 
Property / cites work: From selective IBE to full IBE and selective HIBE / rank
 
Normal rank
Property / cites work
 
Property / cites work: New constructions of identity-based and key-dependent message secure encryption schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Encryption Schemes with Auxiliary Inputs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737236 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Identity-Based Encryption Without Random Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Semi-adaptive Security and Bundling Functionalities Made Generic and Easy / rank
 
Normal rank
Property / cites work
 
Property / cites work: Trapdoors for hard lattices and new cryptographic constructions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-resilient cryptography from minimal assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key dependent message security and receiver selective opening security for identity-based encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: A key distribution system equivalent to factoring / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Cryptosystems Resilient to Key Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Cryptosystems and Signature Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fuzzy Identity-Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Collision resistant hashing from sub-exponential learning parity with noise / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simple and generic constructions of succinct functional encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: From Minicrypt to Obfustopia via Private-Key Functional Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability Obfuscation for Turing Machines with Unbounded Memory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Compactness vs Collusion Resistance in Functional Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation from SXDH on 5-linear maps and locality-5 PRGs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability Obfuscation with Non-trivial Efficiency / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Construct Pseudorandom Permutations from Pseudorandom Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability obfuscation from trilinear maps and block-wise local PRGs / rank
 
Normal rank
Property / cites work
 
Property / cites work: A proof of security of Yao's protocol for two-party computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to use indistinguishability obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Obfuscate Programs Directly / rank
 
Normal rank

Latest revision as of 01:52, 16 July 2024

scientific article
Language Label Description Also known as
English
Anonymous IBE, leakage resilience and circular security from new assumptions
scientific article

    Statements

    Anonymous IBE, leakage resilience and circular security from new assumptions (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    9 July 2018
    0 references
    anonymous identity-based encryption (IBE)
    0 references
    computational Diffie-Hellman (CDH) assumption
    0 references
    0 references
    0 references

    Identifiers