Asymptotically compact adaptively secure lattice IBEs and verifiable random functions via generalized partitioning techniques

From MaRDI portal
Revision as of 05:00, 1 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:1675199

DOI10.1007/978-3-319-63697-9_6zbMath1406.94084OpenAlexW2593367459MaRDI QIDQ1675199

Shota Yamada

Publication date: 27 October 2017

Full work available at URL: https://doi.org/10.1007/978-3-319-63697-9_6





Related Items (24)

Generic Constructions of Revocable Identity-Based EncryptionAlmost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and MoreAttribute-based signatures from lattices: unbounded attributes and semi-adaptive securityMore efficient adaptively secure lattice-based IBE with equality test in the standard modelAdaptive-Secure VRFs with Shorter Keys from Static AssumptionsThe price of verifiability: lower bounds for verifiable random functionsLattice-based programmable hash functions and applicationsEfficient hybrid exact/relaxed lattice proofs and applications to rounding and VRFsRing-based identity based encryption -- asymptotically shorter MPK and tighter securityDirect computation of branching programs and its applications to more efficient lattice-based cryptographySimulatable verifiable random function from the LWE assumptionRevocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and moreTwo Efficient Tag-Based Encryption Schemes on LatticesAdaptively secure identity-based encryption from middle-product learning with errorsPractical verifiable random function with RKA securityAdaptively secure distributed PRFs from \(\mathsf{LWE}\)Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymityRing/module learning with errors under linear leakage -- hardness and applicationsIdentity-based encryption from LWE with more compact master public keyAttribute-based keyed fully homomorphic encryptionGeneric construction of server-aided revocable hierarchical identity-based encryptionEfficient adaptively-secure IB-KEMs and VRFs via near-collision resistanceVerifiable random functions with optimal tightnessAdaptively secure constrained pseudorandom functions in the standard model







This page was built for publication: Asymptotically compact adaptively secure lattice IBEs and verifiable random functions via generalized partitioning techniques