Towards Tightly Secure Lattice Short Signature and Id-Based Encryption

From MaRDI portal
Publication:2953784

DOI10.1007/978-3-662-53890-6_14zbMath1407.94091OpenAlexW2557163026MaRDI QIDQ2953784

Qinyi Li, Xavier Boyen

Publication date: 6 January 2017

Published in: Advances in Cryptology – ASIACRYPT 2016 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-53890-6_14




Related Items (21)

Generic Constructions of Revocable Identity-Based EncryptionAlmost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and MoreFaster Gaussian sampling for trapdoor lattices with arbitrary modulusOptimal tightness for chain-based unique signaturesEfficient laconic cryptography from learning with errorsLattice-based signatures with tight adaptive corruptions and moreA note on the post-quantum security of (ring) signaturesLattice-based programmable hash functions and applicationsRing-based identity based encryption -- asymptotically shorter MPK and tighter securityDirect computation of branching programs and its applications to more efficient lattice-based cryptographyRevocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and moreTightly Secure IBE Under Constant-Size Master Public KeyTighter security proofs for GPV-IBE in the quantum random oracle modelLattice-based unidirectional infinite-use proxy re-signatures with private re-signature keyGeneric construction of server-aided revocable hierarchical identity-based encryptionEfficient adaptively-secure IB-KEMs and VRFs via near-collision resistanceVerifiable random functions with optimal tightnessIBE with tight security against selective opening and chosen-ciphertext attacksA new Gaussian sampling for trapdoor lattices with arbitrary modulusTightly secure signature schemes from the LWE and subset sum assumptionsShort identity-based signatures with tight security from lattices



Cites Work


This page was built for publication: Towards Tightly Secure Lattice Short Signature and Id-Based Encryption