Programmable Hash Functions in the Multilinear Setting
From MaRDI portal
Publication:2845692
DOI10.1007/978-3-642-40041-4_28zbMath1310.94145OpenAlexW199192073MaRDI QIDQ2845692
Kenneth G. Paterson, Eduarda S. V. Freire, Dennis Hofheinz, Christoph Striecks
Publication date: 2 September 2013
Published in: Advances in Cryptology – CRYPTO 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-40041-4_28
digital signaturesidentity-based encryptionmultilinear mapsprogrammable hash functionsidentity-based non-interactive key exchange
Related Items (20)
Adaptively secure distributed PRFs from LWE ⋮ Programmable Hash Functions Go Private: Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys ⋮ Public-key authenticated encryption with keyword search revisited: security model and constructions ⋮ Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions ⋮ The random oracle model: a twenty-year retrospective ⋮ Multilinear maps from obfuscation ⋮ Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation ⋮ Privately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomness ⋮ Batch arguments for \textsf{NP} and more from standard bilinear group assumptions ⋮ Locally verifiable signature and key aggregation ⋮ Lattice-based programmable hash functions and applications ⋮ Identity-based aggregate signcryption in the standard model from multilinear maps ⋮ Verifiable Random Functions from Standard Assumptions ⋮ Multilinear Maps from Obfuscation ⋮ Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps ⋮ Adaptively secure distributed PRFs from \(\mathsf{LWE}\) ⋮ Constrained PRFs for Unbounded Inputs with Short Keys ⋮ Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance ⋮ Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes ⋮ On instantiating the algebraic group model from falsifiable assumptions
This page was built for publication: Programmable Hash Functions in the Multilinear Setting