scientific article; zbMATH DE number 1996402
From MaRDI portal
Publication:4432349
zbMath1030.94032MaRDI QIDQ4432349
Publication date: 22 October 2003
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
elliptic curve cryptographymultilinear mapsabelian variety cryptographygeneralized Tate pairinggeneralized Weil pairing
Related Items (50)
Tensors in computations ⋮ Impossibility of order-revealing encryption in idealized models ⋮ The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks ⋮ Return of GGH15: provable security against zeroizing attacks ⋮ Cryptanalysis of tripartite and multi-party authenticated key agreement protocols ⋮ Redei reciprocity, governing fields and negative Pell ⋮ Cryptanalysis of multilinear maps from ideal lattices: revisited ⋮ From FE combiners to secure MPC and back ⋮ Algebraic generalization of Diffie-Hellman key exchange ⋮ Multiparty noninteractive key exchange from ring key-homomorphic weak PRFs ⋮ Multilinear maps from obfuscation ⋮ Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation ⋮ Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications ⋮ Multiparty non-interactive key exchange and more from isogenies on elliptic curves ⋮ Identity-based encryption in DDH hard groups ⋮ Cryptanalysis of the CLT13 multilinear map ⋮ Adaptive multiparty NIKE ⋮ Homomorphic encryption: a mathematical survey ⋮ Cryptographic multilinear maps using pro-\(p\) groups ⋮ A survey on functional encryption ⋮ Group homomorphic encryption: characterizations, impossibility results, and applications ⋮ On the security of some aggregate signature schemes ⋮ Identity-based aggregate signcryption in the standard model from multilinear maps ⋮ Group key agreement for secure group communication in dynamic peer systems ⋮ Efficient selective identity-based encryption without random oracles ⋮ Offline witness encryption with semi-adaptive security ⋮ Practical Order-Revealing Encryption with Limited Leakage ⋮ Generic hardness of inversion on ring and its relation to self-bilinear map ⋮ An algebraic framework for Diffie-Hellman assumptions ⋮ Obfuscating conjunctions ⋮ Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation ⋮ Efficient obfuscation for CNF circuits and applications in cloud computing ⋮ Algebraic curves and cryptography ⋮ Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits ⋮ Constraining Pseudorandom Functions Privately ⋮ Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE ⋮ Multi-party authenticated key agreement protocols from multi-linear forms ⋮ NP-hardness of approximating meta-complexity: a cryptographic approach ⋮ Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings ⋮ Multilinear Maps from Obfuscation ⋮ How to build time-lock encryption ⋮ Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps ⋮ Attribute-based fuzzy identity access control in multicloud computing environments ⋮ Asymmetric Group Key Agreement ⋮ Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information ⋮ Shorter Circuit Obfuscation in Challenging Security Models ⋮ Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol ⋮ A group key agreement protocol from pairings ⋮ Homomorphic Encryption ⋮ Lattice-Based SNARGs and Their Application to More Efficient Obfuscation
This page was built for publication: