Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
From MaRDI portal
Publication:1688405
DOI10.1007/s00453-016-0242-8zbMath1405.94045OpenAlexW2553934243MaRDI QIDQ1688405
Publication date: 5 January 2018
Published in: Algorithmica (Search for Journal in Brave)
Full work available at URL: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.400.7157
Related Items (9)
Limits on the Efficiency of (Ring) LWE Based Non-interactive Key Exchange ⋮ Efficient Fully Anonymous Public-Key Trace and Revoke with Adaptive IND-CCA Security ⋮ Broadcast, trace and revoke with optimal parameters from polynomial hardness ⋮ Multiparty non-interactive key exchange and more from isogenies on elliptic curves ⋮ Arrangements of Pseudocircles: Triangles and Drawings ⋮ Functional broadcast encryption with applications to data sharing for cloud storage ⋮ Functional encryption for cubic polynomials and implementation ⋮ Limits on the efficiency of (ring) LWE-based non-interactive key exchange ⋮ Optimal broadcast encryption from pairings and LWE
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A one round protocol for tripartite Diffie-Hellman
- How to Avoid Obfuscation Using Witness PRFs
- Multi-party Key Exchange for Unbounded Parties from Indistinguishability Obfuscation
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Cryptanalysis of GGH Map
- Cryptanalysis of GGH15 Multilinear Maps
- Practical Multilinear Maps over the Integers
- Programmable Hash Functions in the Multilinear Setting
- Constrained Pseudorandom Functions and Their Applications
- Low Overhead Broadcast Encryption from Multilinear Maps
- Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
- Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
- Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts
- Cryptanalysis of the Multilinear Map over the Integers
- How to Generate and Use Universal Samplers
- Black-box obfuscation for d-CNFs
- Breaking and Repairing Asymmetric Public-Key Traitor Tracing
- Public Key Broadcast Encryption for Stateless Receivers
- Secure Obfuscation in a Weak Multilinear Map Model
- Obfuscation of Hyperplane Membership
- Privacy in Encrypted Content Distribution Using Private Broadcast Encryption
- Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups
- On obfuscating point functions
- Perfect Non-interactive Zero Knowledge for NP
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- On Best-Possible Obfuscation
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
- Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
- Non-Interactive Key Exchange
- Candidate Multilinear Maps from Ideal Lattices
- On the complexity of differentially private data release
- How to use indistinguishability obfuscation
- Separations in Circular Security for Arbitrary Length Key Cycles
- Graph-Induced Multilinear Maps from Lattices
- Breaking the Sub-Exponential Barrier in Obfustopia
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Public Traceability in Traitor Tracing Schemes
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Functional Signatures and Pseudorandom Functions
- Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation
- Protecting Obfuscation against Algebraic Attacks
- Advances in Cryptology - CRYPTO 2003
- Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys
- Zaps and Their Applications
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Answering n {2+o(1)} counting queries with differential privacy is hard
- Witness encryption and its applications
- Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding
- One-Way Functions and (Im)perfect Obfuscation
This page was built for publication: Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation