Pages that link to "Item:Q2849390"
From MaRDI portal
The following pages link to An Algebraic Framework for Diffie-Hellman Assumptions (Q2849390):
Displayed 50 items.
- Generic Construction of UC-Secure Oblivious Transfer (Q2794494) (← links)
- Verifiable Random Functions from Standard Assumptions (Q2796131) (← links)
- Reconfigurable Cryptography: A Flexible Approach to Long-Term Security (Q2796136) (← links)
- Multilinear Maps from Obfuscation (Q2796137) (← links)
- Déjà Q: Encore! Un Petit IBE (Q2799097) (← links)
- A Study of Pair Encodings: Predicate Encryption in Prime Order Groups (Q2799098) (← links)
- Attribute Based Encryption with Direct Efficiency Tradeoff (Q2822674) (← links)
- New Techniques for Non-interactive Shuffle and Range Arguments (Q2822687) (← links)
- A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups (Q2827707) (← links)
- Fully Secure Functional Encryption for Inner Products, from Standard Assumptions (Q2829952) (← links)
- Design in Type-I, Run in Type-III: Fast and Scalable Bilinear-Type Conversion Using Integer Programming (Q2829954) (← links)
- Adaptive Oblivious Transfer and Generalization (Q2953778) (← links)
- Structure-Preserving Smooth Projective Hashing (Q2953782) (← links)
- How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones (Q2953786) (← links)
- Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings (Q2953790) (← links)
- Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting (Q2953791) (← links)
- A Shuffle Argument Secure in the Generic Model (Q2953798) (← links)
- The Kernel Matrix Diffie-Hellman Assumption (Q2958145) (← links)
- Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts (Q3181025) (← links)
- IBE Under $$k$$-LIN with Shorter Ciphertexts and Private Keys (Q3194594) (← links)
- Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting (Q3457062) (← links)
- Structure-Preserving Signatures from Standard Assumptions, Revisited (Q3457070) (← links)
- Efficient Pseudorandom Functions via On-the-Fly Adaptation (Q3457117) (← links)
- An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security (Q3457120) (← links)
- Hierarchical Identity-Based Encryption with Tight Multi-challenge Security (Q5041156) (← links)
- On QA-NIZK in the BPK Model (Q5041171) (← links)
- QA-NIZK Arguments of Same Opening for Bilateral Commitments (Q5048959) (← links)
- New Proof for BKP IBE Scheme and Improvement in the MIMC Setting (Q5056014) (← links)
- Improved Constructions of Anonymous Credentials from Structure-Preserving Signatures on Equivalence Classes (Q5087265) (← links)
- Adaptive Partitioning (Q5270372) (← links)
- CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions (Q5738751) (← links)
- Improved Structure Preserving Signatures Under Standard Bilinear Assumptions (Q5738756) (← links)
- Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems (Q5738797) (← links)
- Multi-input Inner-Product Functional Encryption from Pairings (Q5738891) (← links)
- Tightly secure hierarchical identity-based encryption (Q5919017) (← links)
- Minicrypt primitives with algebraic structure and applications (Q5925579) (← links)
- Bounded-collusion decentralized ABE with sublinear parameters (Q6040630) (← links)
- Multiparty noninteractive key exchange from ring key-homomorphic weak PRFs (Q6057185) (← links)
- Fully adaptive decentralized multi-authority \textsf{ABE} (Q6063528) (← links)
- Traitor tracing with \(N^{1/3}\)-size ciphertexts and \(O(1)\)-size keys from \(k\)-Lin (Q6063536) (← links)
- Almost tightly-secure re-randomizable and replayable CCA-secure public key encryption (Q6067364) (← links)
- A practical compiler for attribute-based encryption: new decentralized constructions and more (Q6080899) (← links)
- Chopsticks: fork-free two-round multi-signatures from non-interactive assumptions (Q6083682) (← links)
- Almost tight multi-user security under adaptive corruptions \& leakages in the standard model (Q6085265) (← links)
- Fine-grained verifier NIZK and its applications (Q6088993) (← links)
- Multi-client inner product encryption: function-hiding instantiations without random oracles (Q6091137) (← links)
- Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication (Q6101280) (← links)
- Witness encryption from smooth projective hashing system (Q6111981) (← links)
- Trapdoor sanitizable and redactable signatures with unlinkability, invisibility and strong context-hiding (Q6134227) (← links)
- Mix-nets from re-randomizable and replayable CCA-secure public-key encryption (Q6134817) (← links)