Design in type-I, run in type-III: fast and scalable bilinear-type conversion using integer programming
From MaRDI portal
Publication:2829954
Recommendations
- Converting cryptographic schemes from symmetric to asymmetric bilinear groups
- Converting pairing-based cryptosystems from composite-order groups to prime-order groups
- Tools for simulating features of composite order bilinear groups in the prime order setting
- On the (Im)possibility of projecting property in prime-order setting
- Type 2 structure-preserving signature schemes revisited
Cites work
- A heuristic quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- An algebraic framework for Diffie-Hellman assumptions
- Applied integer programming. Modeling and solution.
- Automated analysis of cryptographic assumptions in generic group models
- Batch Groth-Sahai
- Comparing two pairing-based aggregate signature schemes
- Constant-size structure-preserving signatures: generic constructions and simple assumptions
- Converting cryptographic schemes from symmetric to asymmetric bilinear groups
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Efficient Identity-Based Encryption Without Random Oracles
- Efficient noninteractive proof systems for bilinear groups
- Faster index calculus for the medium prime case application to 1175-bit and 1425-bit finite fields
- Fine-Tuning Groth-Sahai Proofs
- Groth–Sahai Proofs Revisited
- Group signatures with message-dependent opening in the standard model
- On computable isomorphisms in efficient asymmetric pairing-based systems
- On cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisited
- Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations
- SCIP: solving constraint integer programs
- Secure efficient history-hiding append-only signatures in the standard model
- Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds
- Structure-preserving signatures and commitments to group elements
- Tagged one-time signatures: tight security and optimal tag size
- Theory of Cryptography
- Traceable group encryption
Cited in
(5)- Curves with Fast Computations in the First Pairing Group
- Converting cryptographic schemes from symmetric to asymmetric bilinear groups
- SCRAPE: scalable randomness attested by public entities
- Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice
- A simple and efficient framework of proof systems for NP
This page was built for publication: Design in type-I, run in type-III: fast and scalable bilinear-type conversion using integer programming
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2829954)