Pages that link to "Item:Q3627448"
From MaRDI portal
The following pages link to Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme (Q3627448):
Displaying 28 items.
- Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares (Q306248) (← links)
- Programmable hash functions and their applications (Q434345) (← links)
- Linearly homomorphic structure-preserving signatures and their applications (Q887427) (← links)
- Direct chosen-ciphertext secure identity-based key encapsulation without random oracles (Q1034629) (← links)
- All-but-many encryption (Q1747665) (← links)
- New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem (Q1750339) (← links)
- Collusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard model (Q2031043) (← links)
- On the tight security of TLS 1.3: theoretically sound cryptographic parameters for real-world deployments (Q2044755) (← links)
- Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance (Q2061937) (← links)
- Verifiable random functions with optimal tightness (Q2061948) (← links)
- Adaptively secure constrained pseudorandom functions in the standard model (Q2096499) (← links)
- Short identity-based signatures with tight security from lattices (Q2118556) (← links)
- Puncturable identity-based and attribute-based encryption from lattices (Q2166727) (← links)
- Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles (Q2377064) (← links)
- Short signatures from Diffie-Hellman: realizing almost compact public key (Q2408586) (← links)
- Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme (Q2438535) (← links)
- Ring-based identity based encryption -- asymptotically shorter MPK and tighter security (Q2697891) (← links)
- Verifiable Random Functions from Standard Assumptions (Q2796131) (← links)
- Optimal Security Proofs for Signatures from Identification Schemes (Q2829210) (← links)
- Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps (Q2953793) (← links)
- Verifiable Security of Boneh-Franklin Identity-Based Encryption (Q3092349) (← links)
- Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme (Q3627448) (← links)
- Verifiable random functions from non-interactive witness-indistinguishable proofs (Q5918799) (← links)
- Lattice-based programmable hash functions and applications (Q6182001) (← links)
- Adaptively secure identity-based encryption from middle-product learning with errors (Q6535491) (← links)
- Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices (Q6544463) (← links)
- Tightly secure (H)IBE in the random oracle model (Q6564027) (← links)
- Identity-based encryption from LWE with more compact master public key (Q6636117) (← links)