Disjunctions for Hash Proof Systems: New Constructions and Applications

From MaRDI portal
Revision as of 21:16, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:2948379


DOI10.1007/978-3-662-46803-6_3zbMath1326.94065WikidataQ56920953 ScholiaQ56920953MaRDI QIDQ2948379

David Pointcheval, Fabrice Benhamouda, Michel Abdalla

Publication date: 30 September 2015

Published in: Advances in Cryptology - EUROCRYPT 2015 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-46803-6_3


94A60: Cryptography

68P25: Data encryption (aspects in computer science)

94A62: Authentication, digital signatures and secret sharing


Related Items

On Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation Soundness, On QA-NIZK in the BPK Model, Adaptive Partitioning, CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions, Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems, Almost tightly-secure re-randomizable and replayable CCA-secure public key encryption, Identity-based encryption in DDH hard groups, Chosen ciphertext secure keyed two-level homomorphic encryption, Witness encryption from smooth projective hashing system, Rate-1 incompressible encryption from standard assumptions, Efficient NIZKs for algebraic sets, Smooth zero-knowledge hash functions, Shorter quasi-adaptive NIZK proofs for linear subspaces, Practical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofs, A gapless code-based hash proof system based on RQC and its applications, Subversion-resistant quasi-adaptive NIZK and applications to modular zk-SNARKs, Verifier-based anonymous password-authenticated key exchange protocol in the standard model, Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions, Public key encryption with equality test via hash proof system, QANIZK for adversary-dependent languages and their applications, Cryptanalysis of the CLT13 multilinear map, One-Round Strong Oblivious Signature-Based Envelope, Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions