Lattice-based programmable hash functions and applications (Q6182001): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
Property / cites work
 
Property / cites work: Ring-based identity based encryption -- asymptotically shorter MPK and tighter security / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Lattice (H)IBE in the Standard Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4228459 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4938616 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Short Signatures with Short Public Keys from Homomorphic Trapdoor Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Improved Compression Technique for Signatures Based on Learning with Errors / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Signatures from Standard Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783728 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Breaking RSA may not be equivalent to factoring / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lattice Mixing and Vanishing Trapdoors: A Framework for Fully Secure Short Signatures and More / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards Tightly Secure Lattice Short Signature and Id-Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bonsai Trees, or How to Delegate a Lattice Basis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Programmable Hash Functions Go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of the Multilinear Map over the Integers / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Identity Based Encryption Scheme Based on Quadratic Residues / rank
 
Normal rank
Property / cites work
 
Property / cites work: Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Multilinear Maps over the Integers / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Amortized Complexity of Zero-Knowledge Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lattice Signatures and Bimodal Gaussians / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Identity-Based Encryption over NTRU Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Short Lattice Signatures in the Standard Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Families of finite sets in which no set is covered by the union of \(r\) others / rank
 
Normal rank
Property / cites work
 
Property / cites work: Programmable Hash Functions in the Multilinear Setting / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate Multilinear Maps from Ideal Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Identity-Based Encryption Without Random Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Trapdoors for hard lattices and new cryptographic constructions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leveled Fully Homomorphic Signatures from Standard Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups / rank
 
Normal rank
Property / cites work
 
Property / cites work: Short Signatures from Weaker Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Programmable Hash Functions and Their Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Programmable hash functions and their applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of GGH Map / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance / rank
 
Normal rank
Property / cites work
 
Property / cites work: Short lattice signatures in the standard model with efficient tag generation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: Digital Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941882 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lattice Signatures without Trapdoors / rank
 
Normal rank
Property / cites work
 
Property / cites work: Asymptotically Efficient Lattice-Based Digital Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Ideal Lattices and Learning with Errors over Rings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller / rank
 
Normal rank
Property / cites work
 
Property / cites work: Worst‐Case to Average‐Case Reductions Based on Gaussian Measures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simpler Efficient Group Signatures from Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Cryptosystems and Signature Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Identity-Based Encryption Without Random Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters / rank
 
Normal rank
Property / cites work
 
Property / cites work: Asymptotically compact adaptively secure lattice IBEs and verifiable random functions via generalized partitioning techniques / rank
 
Normal rank
Property / cites work
 
Property / cites work: Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Identity-Based Encryption in the Quantum Random Oracle Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes / rank
 
Normal rank

Revision as of 20:47, 23 August 2024

scientific article; zbMATH DE number 7793132
Language Label Description Also known as
English
Lattice-based programmable hash functions and applications
scientific article; zbMATH DE number 7793132

    Statements

    Lattice-based programmable hash functions and applications (English)
    0 references
    23 January 2024
    0 references
    lattices
    0 references
    programmable hash functions
    0 references
    standard model
    0 references
    digital signature
    0 references
    identity-based encryption
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references