Programmable hash functions in the multilinear setting
From MaRDI portal
Publication:2845692
Recommendations
- Programmable Hash Functions and Their Applications
- Programmable hash functions and their applications
- Programmable hash functions go private: constructions and applications to (homomorphic) signatures with shorter public keys
- Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes
- Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures
Cited in
(27)- Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance
- Lattice-based programmable hash functions and applications
- Linear hash functions
- The random oracle model: a twenty-year retrospective
- Programmable hash functions and their applications
- On Building Hash Functions from Multivariate Quadratic Equations
- Adaptively secure distributed PRFs from \(\mathsf{LWE}\)
- On instantiating the algebraic group model from falsifiable assumptions
- Programmable Hash Functions and Their Applications
- Adaptively secure distributed PRFs from LWE
- Constrained PRFs for unbounded inputs with short keys
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
- Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures
- Applications of hashing in algebraic manipulation (an annotated bibliography)
- Multilinear maps from obfuscation
- Privately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomness
- Verifiable random functions from standard assumptions
- Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes
- Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions
- Public-key authenticated encryption with keyword search revisited: security model and constructions
- Monotone-policy aggregate signatures
- Locally verifiable signature and key aggregation
- Identity-based aggregate signcryption in the standard model from multilinear maps
- Multilinear maps from obfuscation
- Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps
- Batch arguments for \textsf{NP} and more from standard bilinear group assumptions
- Programmable hash functions go private: constructions and applications to (homomorphic) signatures with shorter public keys
This page was built for publication: Programmable hash functions in the multilinear setting
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2845692)