Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes
From MaRDI portal
Publication:2829951
Recommendations
- Programmable hash functions go private: constructions and applications to (homomorphic) signatures with shorter public keys
- Shorter hash-and-sign lattice-based signatures
- Programmable Hash Functions and Their Applications
- Programmable hash functions and their applications
- Programmable hash functions in the multilinear setting
- Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions
- Approximate trapdoors for lattices and smaller hash-and-sign signatures
- scientific article; zbMATH DE number 7407285
- Lattice-Based Signatures: Optimization and Implementation on Reconfigurable Hardware
- Short identity-based signatures with tight security from lattices
Cites work
- scientific article; zbMATH DE number 1256724 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- scientific article; zbMATH DE number 1405637 (Why is no real title available?)
- scientific article; zbMATH DE number 1418320 (Why is no real title available?)
- A toolkit for ring-LWE cryptography
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- An Identity Based Encryption Scheme Based on Quadratic Residues
- An improved compression technique for signatures based on learning with errors
- Asymptotically Efficient Lattice-Based Digital Signatures
- Bonsai trees, or how to delegate a lattice basis
- Breaking RSA may not be equivalent to factoring
- Candidate Multilinear Maps from Ideal Lattices
- Cryptanalysis of GGH map
- Cryptanalysis of the multilinear map over the integers
- Digital Signatures
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Efficient identity-based encryption over NTRU lattices
- Efficient lattice (H)IBE in the standard model
- Families of finite sets in which no set is covered by the union of \(r\) others
- Functional encryption for inner product predicates from learning with errors
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Identity-based cryptosystems and signature schemes
- Improved short lattice signatures in the standard model
- Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE
- Lattice mixing and vanishing trapdoors: a framework for fully secure short signatures and more
- Lattice signatures and bimodal Gaussians
- Lattice signatures without trapdoors
- Leveled fully homomorphic signatures from standard lattices
- On ideal lattices and learning with errors over rings
- On lattices, learning with errors, random linear codes, and cryptography
- On the Amortized Complexity of Zero-Knowledge Protocols
- On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups
- Practical Identity-Based Encryption Without Random Oracles
- Practical multilinear maps over the integers
- Practical signatures from standard assumptions
- Programmable Hash Functions and Their Applications
- Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes
- Programmable hash functions and their applications
- Programmable hash functions go private: constructions and applications to (homomorphic) signatures with shorter public keys
- Programmable hash functions in the multilinear setting
- Secure identity-based encryption in the quantum random oracle model
- Short signatures from weaker assumptions
- Short signatures with short public keys from homomorphic trapdoor functions
- Simpler efficient group signatures from lattices
- Theory of Cryptography
- Trapdoors for hard lattices and new cryptographic constructions
- Trapdoors for lattices: simpler, tighter, faster, smaller
- Two-dimensional representation of cover free families and its applications: short signatures and more
- Worst‐Case to Average‐Case Reductions Based on Gaussian Measures
- Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations
Cited in
(17)- A new Gaussian sampling for trapdoor lattices with arbitrary modulus
- A New Design of Online/Offline Signatures Based on Lattice
- Attribute-based signatures from lattices: unbounded attributes and semi-adaptive security
- Two efficient tag-based encryption schemes on lattices
- Revocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and more
- Lattice-based programmable hash functions and applications
- Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps
- CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors
- Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions
- Short signatures with short public keys from homomorphic trapdoor functions
- Ring-based identity based encryption -- asymptotically shorter MPK and tighter security
- Identity-based encryption from LWE with more compact master public key
- Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance
- Programmable hash functions go private: constructions and applications to (homomorphic) signatures with shorter public keys
- Programmable hash functions in the multilinear setting
- Adaptively secure identity-based encryption from middle-product learning with errors
- Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes
This page was built for publication: Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2829951)