The following pages link to (Q4938616):
Displaying 50 items.
- Lattice-based linearly homomorphic signatures in the standard model (Q284579) (← links)
- Policy-based signature scheme from lattices (Q306050) (← links)
- Generating shorter bases for hard random lattices (Q537918) (← links)
- Two-message statistically sender-private OT from LWE (Q1631337) (← links)
- Shortest vector from lattice sieving: a few dimensions for free (Q1648783) (← links)
- Faster Gaussian sampling for trapdoor lattices with arbitrary modulus (Q1648788) (← links)
- Hardness of \(k\)-LWE and applications in traitor tracing (Q1688407) (← links)
- Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption (Q1711842) (← links)
- A lattice-based group signature scheme with verifier-local revocation (Q1749538) (← links)
- Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key (Q2037197) (← links)
- Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity (Q2043417) (← links)
- Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}} (Q2056681) (← links)
- Multiparty reusable non-interactive secure computation from LWE (Q2056764) (← links)
- Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption (Q2057139) (← links)
- Wildcarded identity-based encryption from lattices (Q2067630) (← links)
- Chosen-ciphertext lattice-based public key encryption with equality test in standard model (Q2072076) (← links)
- An optimized GHV-type HE scheme: simpler, faster, and more versatile (Q2096603) (← links)
- Generating cryptographically-strong random lattice bases and recognizing rotations of \(\mathbb{Z}^n\) (Q2118552) (← links)
- Attribute-based access control for inner product functional encryption from LWE (Q2146083) (← links)
- Lattice-based HRA-secure attribute-based proxy re-encryption in standard model (Q2148757) (← links)
- On the higher-bit version of approximate inhomogeneous short integer solution problem (Q2149828) (← links)
- Lattice-based IBE with equality test supporting flexible authorization in the standard model (Q2152055) (← links)
- Puncturable identity-based and attribute-based encryption from lattices (Q2166727) (← links)
- Lattice-based public-key encryption with equality test supporting flexible authorization in standard model (Q2166741) (← links)
- Revocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and more (Q2215969) (← links)
- Speeding-up verification of digital signatures (Q2220442) (← links)
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification (Q2232597) (← links)
- Post-quantum cryptography: lattice signatures (Q2390954) (← links)
- Lattice-based completely non-malleable public-key encryption in the standard model (Q2448075) (← links)
- A lattice-based signcryption scheme without random oracles (Q2515427) (← links)
- Scalable revocable identity-based signature over lattices in the standard model (Q2662710) (← links)
- Lattice-based secret handshakes with reusable credentials (Q2672459) (← links)
- Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013 (Q2673979) (← links)
- Simulatable verifiable random function from the LWE assumption (Q2700784) (← links)
- Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes (Q2829951) (← links)
- Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption (Q2953774) (← links)
- Multi-key Homomorphic Authenticators (Q2953787) (← links)
- Secure multi-source network coding scheme with lattice signature (Q2993817) (← links)
- The Geometry of Lattice Cryptography (Q3092183) (← links)
- Two Efficient Tag-Based Encryption Schemes on Lattices (Q3297485) (← links)
- Compact (Targeted Homomorphic) Inner Product Encryption from LWE (Q3297486) (← links)
- Simplified Revocable Hierarchical Identity-Based Encryption from Lattices (Q3297616) (← links)
- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications (Q4916004) (← links)
- Improved (Hierarchical) Inner-Product Encryption from Lattices (Q4916012) (← links)
- A Lattice-Based Certificateless Public Key Encryption with Equality Test in Standard Model (Q5040375) (← links)
- Attribute-Based Keyword Search from Lattices (Q5040376) (← links)
- Untraceability of Partial Blind and Blind Signature Schemes (Q5040418) (← links)
- Collusion Resistant Traitor Tracing from Learning with Errors (Q5130846) (← links)
- Cryptanalyses of Candidate Branching Program Obfuscators (Q5270365) (← links)
- Short Stickelberger Class Relations and Application to Ideal-SVP (Q5738882) (← links)