Lossy Trapdoor Functions and Their Applications

From MaRDI portal
Publication:3225173

DOI10.1137/080733954zbMath1236.94063OpenAlexW2067264567MaRDI QIDQ3225173

Chris Peikert, Brent Waters

Publication date: 15 March 2012

Published in: SIAM Journal on Computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1137/080733954




Related Items (27)

Witness Maps and ApplicationsCompact Lossy and All-but-One Trapdoor Functions from LatticeLeakage Resilient One-Way Functions: The Auxiliary-Input SettingUnbounded ABE via bilinear entropy expansion, revisitedFully leakage-resilient signaturesOn the lattice isomorphism problem, quadratic forms, remarkable lattices, and cryptographyInstantiability of RSA-OAEP under chosen-plaintext attackUpdatable all-but-one dual projective hashing and its applicationsInstantiability of classical random-oracle-model encryption transformsReproducible circularly secure bit encryption: applications and realizationsSecure software leasing from standard assumptionsVector and functional commitments from latticesNon-malleable encryption: simpler, shorter, strongerA Practical Post-Quantum Public-Key Cryptosystem Based on $$\textsf {spLWE}$$Lossy Key Encapsulation Mechanism and Its ApplicationsIncremental deterministic public-key encryptionSubversion-resilient signatures: definitions, constructions and applicationsDeterministic public-key encryption for adaptively-chosen plaintext distributionsComputing boundary cycle of a pseudo-triangle polygon from its visibility graphA multi-key SMC protocol and multi-key FHE based on some-are-errorless LWELeakage resilient one-way functions: the auxiliary-input settingA unified approach to deterministic encryption: new constructions and a connection to computational entropyLattice-based identity-based resplittable threshold public key encryption schemeBetter security for deterministic public-key encryption: the auxiliary-input settingCCA-security from adaptive all-but-one lossy trapdoor functionsSender-equivocable encryption schemes secure against chosen-ciphertext attacks revisitedThe Complexity of Public-Key Cryptography




This page was built for publication: Lossy Trapdoor Functions and Their Applications