Generic transformation from broadcast encryption to round-optimal deniable ring authentication
From MaRDI portal
Publication:2115719
DOI10.1007/s10623-021-00975-4zbMath1485.94091OpenAlexW4205434367WikidataQ114849867 ScholiaQ114849867MaRDI QIDQ2115719
Keisuke Hara, Keisuke Tanaka, Goichiro Hanaoka, Takahiro Matsuda
Publication date: 21 March 2022
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-021-00975-4
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- New approaches for deniable authentication
- Deniable ring authentication based on projective hash functions
- Practical functional encryption for quadratic functions with applications to predicate encryption
- Tight adaptively secure broadcast encryption with short ciphertexts and keys
- Subtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed?
- Optimal broadcast encryption from pairings and LWE
- Optimal broadcast encryption from LWE and pairings in the standard model
- Obfuscating simple functionalities from knowledge assumptions
- An Algebraic Framework for Diffie-Hellman Assumptions
- Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication
- Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
- A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
- Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
- Applied Cryptography and Network Security
- Advances in Cryptology - CRYPTO 2003
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Efficient Non-interactive Proof Systems for Bilinear Groups
- Towards Plaintext-Aware Public-Key Encryption Without Random Oracles
- Information Security and Cryptology - ICISC 2003
- On lattices, learning with errors, random linear codes, and cryptography
This page was built for publication: Generic transformation from broadcast encryption to round-optimal deniable ring authentication