An Algebraic Framework for Diffie-Hellman Assumptions

From MaRDI portal
Revision as of 19:22, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:2849390

DOI10.1007/978-3-642-40084-1_8zbMath1316.94070OpenAlexW2394843291WikidataQ59163676 ScholiaQ59163676MaRDI QIDQ2849390

Eike Kiltz, Alex Escala, Gottfried Herold, Carla Ràfols, Jorge Luis Villar

Publication date: 17 September 2013

Published in: Advances in Cryptology – CRYPTO 2013 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-40084-1_8




Related Items (only showing first 100 items - show all)

Mix-nets from re-randomizable and replayable CCA-secure public-key encryptionMulti-client functional encryption with fine-grained access controlCompact and tightly selective-opening secure public-key encryption schemesAnonymous public key encryption under corruptionsKey encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness\(\mathcal{Lunar}\): a toolbox for more efficient universal and updatable zkSNARKs and commit-and-prove extensionsGentry-Wichs is tight: a falsifiable non-adaptively sound SNARGEfficient NIZKs for algebraic setsSmooth zero-knowledge hash functionsAdaptive-Secure VRFs with Shorter Keys from Static AssumptionsCRS-updatable asymmetric quasi-adaptive NIZK argumentsParaDiSE: efficient threshold authenticated encryption in fully malicious modelBeyond Uber: instantiating generic groups via PGGsAdditive-homomorphic functional commitments and applications to homomorphic signaturesLattice-based authenticated key exchange with tight securityHierarchical Identity-Based Encryption with Tight Multi-challenge SecurityOn QA-NIZK in the BPK ModelSO-CCA secure PKE from pairing based all-but-many lossy trapdoor functionsSmooth NIZK argumentsQA-NIZK Arguments of Same Opening for Bilateral CommitmentsQuantum algorithms for the \(k\)-XOR problemBroadcast encryption with size \(N^{1/3}\) and more from \(k\)-LinFine-grained secure attribute-based encryptionAuthenticated key exchange and signatures with tight security in the standard modelNew Proof for BKP IBE Scheme and Improvement in the MIMC SettingSignatures of knowledge for Boolean circuits under standard assumptionsImplicit Zero-Knowledge Arguments and Applications to the Malicious SettingStructure-Preserving Signatures from Standard Assumptions, RevisitedEfficient Pseudorandom Functions via On-the-Fly AdaptationAn Algebraic Framework for Pseudorandom Functions and Applications to Related-Key SecuritySomewhere statistically binding commitment schemes with applicationsPublic-Key Encryption with Simulation-Based Selective-Opening Security and Compact CiphertextsSubversion-resistant quasi-adaptive NIZK and applications to modular zk-SNARKsSuper-strong RKA secure MAC, PKE and SE from tag-based hash proof systemSubversion-resilient enhanced privacy IDUnbounded ABE via bilinear entropy expansion, revisitedIBE Under $$k$$-LIN with Shorter Ciphertexts and Private KeysGeneric constructions for fully secure revocable attribute-based encryptionImproved Constructions of Anonymous Credentials from Structure-Preserving Signatures on Equivalence ClassesHardware security without secure hardware: how to decrypt with a password and a serverTightly CCA-secure identity-based encryption with ciphertext pseudorandomnessBlind key-generation attribute-based encryption for general predicatesBounded-collusion decentralized ABE with sublinear parametersA generic construction of tightly secure signatures in the multi-user settingMultiparty noninteractive key exchange from ring key-homomorphic weak PRFsCompact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-LinMultilinear maps from obfuscationFully adaptive decentralized multi-authority \textsf{ABE}Traitor tracing with \(N^{1/3}\)-size ciphertexts and \(O(1)\)-size keys from \(k\)-LinAlmost tightly-secure re-randomizable and replayable CCA-secure public key encryptionQANIZK for adversary-dependent languages and their applicationsAdaptive Oblivious Transfer and GeneralizationStructure-Preserving Smooth Projective HashingHow to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving OnesDual System Encryption Framework in Prime-Order Groups via Computational Pair EncodingsEfficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge SettingA Shuffle Argument Secure in the Generic ModelA practical compiler for attribute-based encryption: new decentralized constructions and moreChopsticks: fork-free two-round multi-signatures from non-interactive assumptionsAlmost tight multi-user security under adaptive corruptions \& leakages in the standard modelFine-grained verifier NIZK and its applicationsMulti-client inner product encryption: function-hiding instantiations without random oraclesTight lower bounds and optimal constructions of anonymous broadcast encryption and authenticationWitness encryption from smooth projective hashing systemAutomated analysis of cryptographic assumptions in generic group modelsThe Kernel Matrix Diffie-Hellman AssumptionTrapdoor sanitizable and redactable signatures with unlinkability, invisibility and strong context-hidingShorter quasi-adaptive NIZK proofs for linear subspacesSuccinct and adaptively secure ABE for ABP from \(k\)-LinUnbounded HIBE with tight securityTwo-pass authenticated key exchange with explicit authentication and tight securityStatistical ZAPs from group-based assumptionsFully-succinct publicly verifiable delegation from constant-size assumptionsTowards tight adaptive security of non-interactive key exchangeImproved inner-product encryption with adaptive security and full attribute-hidingDecentralized multi-client functional encryption for inner productSimple and more efficient PRFs with tight security from LWE and matrix-DDHImproving the efficiency of re-randomizable and replayable CCA secure public key encryptionAn algebraic framework for Diffie-Hellman assumptionsLeakage-resilient attribute based encryption in prime-order groups via predicate encodingsRelated-key security for pseudorandom functions beyond the linear barrierCCA-Secure Inner-Product Functional Encryption from Projective Hash FunctionsImproved Structure Preserving Signatures Under Standard Bilinear AssumptionsEquivalences and Black-Box Separations of Matrix Diffie-Hellman ProblemsMulti-input Inner-Product Functional Encryption from PairingsConverting pairing-based cryptosystems from composite to prime order setting -- a comparative analysisGeneric Construction of UC-Secure Oblivious TransferVerifiable Random Functions from Standard AssumptionsReconfigurable Cryptography: A Flexible Approach to Long-Term SecurityMultilinear Maps from ObfuscationPractical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofsDéjà Q: Encore! Un Petit IBEA Study of Pair Encodings: Predicate Encryption in Prime Order GroupsOn subversion-resistant SNARKsSimple and efficient FE for quadratic functionsTightly secure hierarchical identity-based encryptionMinicrypt primitives with algebraic structure and applicationsCompact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \)Adaptively secure ABE for DFA from \(k\)-Lin and moreNew constructions of statistical NIZKs: dual-mode DV-NIZKs and more






This page was built for publication: An Algebraic Framework for Diffie-Hellman Assumptions