Pages that link to "Item:Q4924400"
From MaRDI portal
The following pages link to Candidate Multilinear Maps from Ideal Lattices (Q4924400):
Displaying 50 items.
- Multilinear maps from obfuscation (Q2188963) (← links)
- Multiparty non-interactive key exchange and more from isogenies on elliptic curves (Q2191198) (← links)
- Characterizing overstretched NTRU attacks (Q2191207) (← links)
- Offline witness encryption with semi-adaptive security (Q2229274) (← links)
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification (Q2232597) (← links)
- Constrained pseudorandom functions from functional encryption (Q2290626) (← links)
- Leakage resilience from program obfuscation (Q2318088) (← links)
- Sequential aggregate signatures with short public keys without random oracles (Q2344760) (← links)
- Comments on ``Circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation'' (Q2398509) (← links)
- Cryptanalysis of multilinear maps from ideal lattices: revisited (Q2407051) (← links)
- Algebraic generalization of Diffie-Hellman key exchange (Q2413287) (← links)
- QANIZK for adversary-dependent languages and their applications (Q2420581) (← links)
- Cryptanalysis of the CLT13 multilinear map (Q2423847) (← links)
- Quantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptions (Q2661695) (← links)
- Post-quantum online voting scheme (Q2670852) (← links)
- NIKE from affine determinant programs (Q2697912) (← links)
- Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings (Q2790032) (← links)
- Finding Shortest Lattice Vectors in the Presence of Gaps (Q2790044) (← links)
- Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings (Q2796115) (← links)
- On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models (Q2796117) (← links)
- Lower Bounds on Assumptions Behind Indistinguishability Obfuscation (Q2796118) (← links)
- Indistinguishability Obfuscation: From Approximate to Exact (Q2796119) (← links)
- Order-Revealing Encryption and the Hardness of Private Learning (Q2796125) (← links)
- On the Correlation Intractability of Obfuscated Pseudorandom Functions (Q2796135) (← links)
- Multilinear Maps from Obfuscation (Q2796137) (← links)
- Perfect Structure on the Edge of Chaos (Q2796138) (← links)
- How to Avoid Obfuscation Using Witness PRFs (Q2799104) (← links)
- Cutting-Edge Cryptography Through the Lens of Secret Sharing (Q2799105) (← links)
- Functional Encryption Without Obfuscation (Q2799106) (← links)
- Lattice-based identity-based resplittable threshold public key encryption scheme (Q2804886) (← links)
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits (Q2816296) (← links)
- Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information (Q2817818) (← links)
- Offline Witness Encryption (Q2822676) (← links)
- Shorter Circuit Obfuscation in Challenging Security Models (Q2827739) (← links)
- Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium (Q2829231) (← links)
- Cryptanalysis of GGH15 Multilinear Maps (Q2829232) (← links)
- Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13 (Q2829233) (← links)
- Circular Security Separations for Arbitrary Length Cycles from LWE (Q2829235) (← links)
- On the Existence of Extractable One-Way Functions (Q2829449) (← links)
- Spooky Interaction and Its Discontents: Compilers for Succinct Two-Message Argument Systems (Q2829945) (← links)
- Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes (Q2829951) (← links)
- Fully Secure Functional Encryption for Inner Products, from Standard Assumptions (Q2829952) (← links)
- A Subfield Lattice Attack on Overstretched NTRU Assumptions (Q2835586) (← links)
- Key-Policy Attribute-Based Encryption for Boolean Circuits from Bilinear Maps (Q2947114) (← links)
- Lattice Point Enumeration on Block Reduced Bases (Q2947536) (← links)
- Multi-input Functional Encryption with Unbounded-Message Security (Q2953788) (← links)
- An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zero (Q2971014) (← links)
- Gauss Sieve Algorithm on GPUs (Q2975795) (← links)
- One-Round Cross-Domain Group Key Exchange Protocol in the Standard Model (Q2980868) (← links)
- Expanded Framework for Dual System Encryption and Its Application (Q2988343) (← links)