Trapdoor functions from the computational Diffie-Hellman assumption
From MaRDI portal
Publication:1784099
Recommendations
Cited in
(20)- Chosen ciphertext security from injective trapdoor functions
- New constructions of hinting PRGs, OWFs with encryption, and more
- Non-interactive batch arguments for NP from standard assumptions
- Minicrypt primitives with algebraic structure and applications
- Amortizing rate-1 OT and applications to PIR and PSI
- A Feebly Secure Trapdoor Function
- Rate-1 trapdoor functions from the Diffie-Hellman problem
- Efficient laconic cryptography from learning with errors
- Efficient range-trapdoor functions and applications: rate-1 OT and more
- General construction of chameleon all-but-one trapdoor functions
- How to build a trapdoor function from an encryption scheme
- New techniques for efficient trapdoor functions and applications
- Anonymous (hierarchical) identity-based encryption from broader assumptions
- Injective rank metric trapdoor functions with homogeneous errors
- Paillier's trapdoor function hides up to \(O(n)\) bits
- Use of trapdoor structures in cryptography
- Algebraic (trapdoor) one-way functions: constructions and applications
- Fine-grained cryptography revisited
- Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?
- A note on non-interactive zero-knowledge from CDH
This page was built for publication: Trapdoor functions from the computational Diffie-Hellman assumption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1784099)