Another look at tightness. II: Practical issues in cryptography
From MaRDI portal
Publication:2412214
DOI10.1007/978-3-319-61273-7_3zbMath1410.94056OpenAlexW2740854940WikidataQ56854178 ScholiaQ56854178MaRDI QIDQ2412214
Palash Sarkar, Neal Koblitz, Sanjit Chatterjee, Alfred J. Menezes
Publication date: 23 October 2017
Full work available at URL: https://doi.org/10.1007/978-3-319-61273-7_3
Related Items (9)
Multi-user CDH problems and the concrete security of \(\mathsf{NAXOS}\) and \(\mathsf{X3DH}\) ⋮ Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice ⋮ A practical compiler for attribute-based encryption: new decentralized constructions and more ⋮ Classical reduction of gap SVP to LWE: a concrete security analysis ⋮ Concrete security from worst-case to average-case lattice reductions ⋮ Compact structure-preserving signatures with almost tight security ⋮ Verifying solutions to LWE with implications for concrete security ⋮ Optimal Security Proofs for Signatures from Identification Schemes ⋮ Efficient and tight oblivious transfer from PKE with tight multi-user security
This page was built for publication: Another look at tightness. II: Practical issues in cryptography