Generic transformation from broadcast encryption to round-optimal deniable ring authentication
From MaRDI portal
Publication:2115719
DOI10.1007/S10623-021-00975-4zbMATH Open1485.94091OpenAlexW4205434367WikidataQ114849867 ScholiaQ114849867MaRDI QIDQ2115719FDOQ2115719
Authors: Keisuke Hara, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka
Publication date: 21 March 2022
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-021-00975-4
Recommendations
Cites Work
- On lattices, learning with errors, random linear codes, and cryptography
- Title not available (Why is that?)
- Title not available (Why is that?)
- A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
- Efficient Non-interactive Proof Systems for Bilinear Groups
- Title not available (Why is that?)
- Title not available (Why is that?)
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Title not available (Why is that?)
- Title not available (Why is that?)
- Advances in Cryptology - CRYPTO 2003
- New approaches for deniable authentication
- Title not available (Why is that?)
- Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
- An Algebraic Framework for Diffie-Hellman Assumptions
- Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication
- Practical functional encryption for quadratic functions with applications to predicate encryption
- Applied Cryptography and Network Security
- Title not available (Why is that?)
- Information Security and Cryptology - ICISC 2003
- Deniable ring authentication based on projective hash functions
- Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
- Towards Plaintext-Aware Public-Key Encryption Without Random Oracles
- Tight adaptively secure broadcast encryption with short ciphertexts and keys
- Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed?
- Optimal broadcast encryption from pairings and LWE
- Optimal broadcast encryption from LWE and pairings in the standard model
- Obfuscating simple functionalities from knowledge assumptions
This page was built for publication: Generic transformation from broadcast encryption to round-optimal deniable ring authentication
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2115719)