Efficient cryptosystems from 2ᵏ-th power residue symbols
From MaRDI portal
Publication:2397448
DOI10.1007/S00145-016-9229-5zbMATH Open1377.94035OpenAlexW2483232135MaRDI QIDQ2397448FDOQ2397448
Authors: Fabrice Benhamouda, Javier Herranz, Marc Joye, Benoît Libert
Publication date: 22 May 2017
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-016-9229-5
Recommendations
- Efficient cryptosystems from \(2^k\)-th power residue symbols
- New assumptions and efficient cryptosystems from the \(e\)-th power residue symbol
- The distribution of quadratic residues and non-residues in the Goldwasser-Micali type of cryptosystem. II
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- scientific article; zbMATH DE number 1303131
public-key encryptionstandard modelhomomorphic encryptionquadratic residuosityGoldwasser-Micali cryptosystem
Cites Work
- Probabilistic encryption
- Small solutions to polynomial equations, and low exponent RSA vulnerabilities
- An improved algorithm for computing logarithms over<tex>GF(p)</tex>and its cryptographic significance (Corresp.)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Foundations of Cryptography
- On lattices, learning with errors, random linear codes, and cryptography
- Better security for deterministic public-key encryption: the auxiliary-input setting
- A Simple Unpredictable Pseudo-Random Number Generator
- An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information
- Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening
- Lossy trapdoor functions and their applications
- Advances in Cryptology - EUROCRYPT 2004
- Title not available (Why is that?)
- Title not available (Why is that?)
- Receipt-free secret-ballot elections (extended abstract)
- Introduction to modern cryptography
- Theory of Cryptography
- Magic functions
- Generic Homomorphic Undeniable Signatures
- Public Key Cryptography – PKC 2004
- More constructions of lossy and correlation-secure trapdoor functions
- Chosen-ciphertext security from slightly lossy trapdoor functions
- On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
- Deterministic and Efficiently Searchable Encryption
- A New Randomness Extraction Paradigm for Hybrid Encryption
- Dual projective hashing and its applications -- lossy trapdoor functions and more
- Hedged public-key encryption: how to protect against bad randomness
- Fast Generation of Prime Numbers on Portable Devices: An Update
- Title not available (Why is that?)
- Title not available (Why is that?)
- A public-key cryptosystem using purely cubic fields
- More constructions of lossy and correlation-secure trapdoor functions
- Extended-DDH and lossy trapdoor functions
- Instantiability of RSA-OAEP under chosen-plaintext attack
- Tighter Reductions for Forward-Secure Signature Schemes
- A public-key cryptosystem utilizing cyclotomic fields
- Practical chosen ciphertext secure encryption from factoring
- Public-key cryptanalysis
- Title not available (Why is that?)
- Title not available (Why is that?)
Cited In (9)
- Efficient cryptosystems from \(2^k\)-th power residue symbols
- Rinocchio: SNARKs for ring arithmetic
- New assumptions and efficient cryptosystems from the \(e\)-th power residue symbol
- An algebraic framework for silent preprocessing with trustless setup and active security
- Mon\(\mathbb{Z}_{2^k}\)a: fast maliciously secure two party computation on \(\mathbb{Z}_{2^k} \)
- Compact selective opening security from LWE
- Threshold linearly homomorphic encryption on \(\mathrm{Z}/2^k\mathrm{Z}\)
- Sherlock Holmes zero-knowledge protocols
- On the tightness of forward-secure signature reductions
This page was built for publication: Efficient cryptosystems from \(2^k\)-th power residue symbols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2397448)