Anonymous IBE, leakage resilience and circular security from new assumptions

From MaRDI portal
Revision as of 04:16, 1 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:1648813

DOI10.1007/978-3-319-78381-9_20zbMath1423.94056OpenAlexW2750848363MaRDI QIDQ1648813

Alex Lombardi, Zvika Brakerski, Gil Segev, Vinod Vaikuntanathan

Publication date: 9 July 2018

Full work available at URL: https://hdl.handle.net/1721.1/137868




Related Items (36)

Master-Key KDM-Secure IBE from PairingsRegistration-based encryption: removing private-key generator from IBEA simple construction of iO for Turing machinesSuccinct garbling schemes from functional encryption through a local simulation paradigmNon-interactive batch arguments for NP from standard assumptionsOptimizing registration based encryptionAnonymous IBE, leakage resilience and circular security from new assumptionsOptimal bounded-collusion secure functional encryptionCPA-to-CCA transformation for KDM securityAdaptively secure garbling schemes for parallel computationsEfficient laconic cryptography from learning with errorsLeakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from latticesBounded functional encryption for Turing machines: adaptive security from general assumptionsForward-secure encryption with fast forwardingSublinear secure computation from new assumptionsCollusion-resistant functional encryption for RAMsUniversal amplification of KDM security: from 1-key circular to multi-key KDMHow to build a trapdoor function from an encryption schemeStatistically sender-private OT from LPN and derandomizationLockable obfuscation from circularly insecure fully homomorphic encryptionBKW meets Fourier new algorithms for LPN with sparse paritiesLaconic private set intersection and applicationsAmortizing rate-1 OT and applications to PIR and PSIRing-based identity based encryption -- asymptotically shorter MPK and tighter securityUpdatable public key encryption in the standard modelDirect computation of branching programs and its applications to more efficient lattice-based cryptographyCollusion Resistant Traitor Tracing from Learning with ErrorsEfficient identity-based encryption with hierarchical key-insulation from HIBECCA security and trapdoor functions via key-dependent-message securityMinicrypt primitives with algebraic structure and applicationsRate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacksUniversal proxy re-encryptionIncompressible encodingsVerifiable registration-based encryptionChosen ciphertext security from injective trapdoor functionsTwo-round oblivious transfer from CDH or LPN



Cites Work




This page was built for publication: Anonymous IBE, leakage resilience and circular security from new assumptions