Efficient Lattice (H)IBE in the Standard Model

From MaRDI portal
Publication:3563855


DOI10.1007/978-3-642-13190-5_28zbMath1227.94022WikidataQ56519030 ScholiaQ56519030MaRDI QIDQ3563855

Shweta Agrawal, Dan Boneh, Xavier Boyen

Publication date: 1 June 2010

Published in: Advances in Cryptology – EUROCRYPT 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-13190-5_28


94A60: Cryptography


Related Items

Unnamed Item, Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment, Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications, Revocable Identity-Based Encryption Revisited: Security Model and Construction, Improved (Hierarchical) Inner-Product Encryption from Lattices, Algorithms for the Generalized NTRU Equations and their Storage Analysis, Lattice-based linearly homomorphic signature scheme over binary field, A Lattice-Based Certificateless Public Key Encryption with Equality Test in Standard Model, Attribute-Based Keyword Search from Lattices, Generic Constructions of Revocable Identity-Based Encryption, Almost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and More, Isochronous Gaussian Sampling: From Inception to Implementation, Compact Lossy and All-but-One Trapdoor Functions from Lattice, Towards a Simpler Lattice Gadget Toolkit, Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model, Algebraic Attacks Against Several Weak Variants of GVW’13 ABE, A Novel Lattice-Based Ciphertext-Policy Attribute-Based Proxy Re-encryption for Cloud Sharing, 0-RTT Key Exchange with Full Forward Secrecy, Private Puncturable PRFs from Standard Lattice Assumptions, Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange, Watermarking cryptographic functionalities from standard lattice assumptions, Simple and generic constructions of succinct functional encryption, Multi-theorem preprocessing NIZKs from lattices, Generic constructions of integrated PKE and PEKS, Tighter security proofs for GPV-IBE in the quantum random oracle model, Adaptive oblivious transfer with access control from lattice assumptions, Survey of Lattice-Based Group Signature, Multi-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input Setting, Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance, Shorter Lattice-Based Group Signatures via “Almost Free” Encryption and Other Optimizations, Succinct vector, polynomial, and functional commitments from lattices, Sender-binding key encapsulation, Unique-path identity based encryption with applications to strongly secure messaging, Decentralized multi-authority attribute-based inner-product FE: large universe and unbounded, Lattice-based zero-knowledge proofs and applications: shorter, simpler, and more general, A new framework for more efficient round-optimal lattice-based (partially) blind signature via trapdoor sampling, Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs, On Constructing Pairing-Free Identity-Based Encryptions, More efficient adaptively secure lattice-based IBE with equality test in the standard model, Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices, A note on the post-quantum security of (ring) signatures, Multi-authority ABE from lattices without random oracles, Forward-secure encryption with fast forwarding, Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance, Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities, Preimage sampling in the higher-bit approximate setting with a non-spherical Gaussian sampler, Cumulatively all-lossy-but-one trapdoor functions from standard assumptions, Identity-based matchmaking encryption from standard assumptions, (Inner-product) functional encryption with updatable ciphertexts, A fully secure lattice-based signcryption with designated equality test in standard model, Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption, Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding, A New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusion, A survey on functional encryption, Simplified server-aided revocable identity-based encryption from lattices, Spatial encryption revisited: from delegatable multiple inner product encryption and more, Public key authenticated encryption with keyword search from LWE, Lattice-based programmable hash functions and applications, Quantum search-to-decision reduction for the LWE problem, Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions, Towards Tightly Secure Lattice Short Signature and Id-Based Encryption, Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps, Identity-Based Blind Signature from Lattices in Standard Model, Multi-bit Leveled Homomorphic Encryption via $$\mathsf {Dual.LWE}$$ -Based, Better Key Sizes (and Attacks) for LWE-Based Encryption, The Geometry of Lattice Cryptography, Deniable Attribute Based Encryption for Branching Programs from LWE, Targeted Homomorphic Attribute-Based Encryption, Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model, Two Efficient Tag-Based Encryption Schemes on Lattices, Compact Inner Product Encryption from LWE, Compact Hierarchical IBE from Lattices in the Standard Model, Simplified Revocable Hierarchical Identity-Based Encryption from Lattices, Lattice-Based Group Signatures with Verifier-Local Revocation: Achieving Shorter Key-Sizes and Explicit Traceability with Ease, Trapdoors for Ideal Lattices with Applications, Predicate Encryption for Circuits from LWE, An efficient IBE scheme with tight security reduction in the random oracle model, Cryptanalysis and improvement of verifiable quantum \((k,n)\) secret sharing, Shorter identity-based encryption via asymmetric pairings, Programmable hash functions and their applications, Strongly secure authenticated key exchange from factoring, codes, and lattices, Efficient selective identity-based encryption without random oracles, SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions, Gaussian sampling of lattices for cryptographic applications, Lattice-based key exchange on small integer solution problem, Adaptively secure distributed PRFs from LWE, Watermarking PRFs under standard assumptions: public marking and security with extraction queries, Lattice-based certificateless encryption scheme, Faster Gaussian sampling for trapdoor lattices with arbitrary modulus, Anonymous IBE, leakage resilience and circular security from new assumptions, Hardness of \(k\)-LWE and applications in traitor tracing, Efficient authentication from hard learning problems, Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing, Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption, STP-LWE: A variant of learning with error for a flexible encryption, Bonsai trees, or how to delegate a lattice basis, Relations between semantic security and anonymity in identity-based encryption, A multi-key SMC protocol and multi-key FHE based on some-are-errorless LWE, A more efficient leveled strongly-unforgeable fully homomorphic signature scheme, Confined guessing: new signatures from standard assumptions, Collusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard model, Traceable ring signatures: general framework and post-quantum security, Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption, Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key, Adaptively secure distributed PRFs from \(\mathsf{LWE}\), Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity, Revocable attribute-based proxy re-encryption, CCA-security from adaptive all-but-one lossy trapdoor functions, Optimal broadcast encryption from pairings and LWE, Impossibility results for lattice-based functional encryption schemes, Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}, New lattice two-stage sampling technique and its applications to functional encryption -- stronger security and smaller ciphertexts, Multiparty reusable non-interactive secure computation from LWE, Generic construction of server-aided revocable hierarchical identity-based encryption, Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption, Exact lattice sampling from non-Gaussian distributions, Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance, Identity-based encryption with security against the KGC: a formal model and its instantiations, Wildcarded identity-based encryption from lattices, LWE from non-commutative group rings, Chosen-ciphertext lattice-based public key encryption with equality test in standard model, Adaptively secure constrained pseudorandom functions in the standard model, Adaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oracles, Implementation of lattice trapdoors on modules and applications, Secure hybrid encryption in the standard model from hard learning problems, A practical adaptive key recovery attack on the LGM (GSW-like) cryptosystem, Key-homomorphic pseudorandom functions from LWE with small modulus, Integral matrix Gram root and lattice Gaussian sampling without floats, Attribute-based signatures from lattices: unbounded attributes and semi-adaptive security, Functional encryption for Turing machines with dynamic bounded collusion from LWE, Attribute-based access control for inner product functional encryption from LWE, Attribute-based conditional proxy re-encryption in the standard model under LWE, Lattice-based HRA-secure attribute-based proxy re-encryption in standard model, Black-box accumulation based on lattices, On the higher-bit version of approximate inhomogeneous short integer solution problem, Puncturable identity-based and attribute-based encryption from lattices, Lattice-based public-key encryption with equality test supporting flexible authorization in standard model, Dynamic collusion bounded functional encryption from identity-based encryption, Lattice trapdoors and IBE from middle-product LWE, Group signature from lattices preserving forward security in dynamic setting, Revocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and more, Trapdoor delegation and HIBE from middle-product LWE in standard model, Efficient identity-based encryption with hierarchical key-insulation from HIBE, Efficient public-key encryption with equality test from lattices, Doubly spatial encryption from DBDH, Anonymous HIBE with short ciphertexts: full security in prime order groups, Quantum-resistant identity-based signature with message recovery and proxy delegation, A new Gaussian sampling for trapdoor lattices with arbitrary modulus, Structure-preserving public-key encryption with leakage-resilient CCA security, Anonymous and leakage resilient IBE and IPE, Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness, Lattice-based completely non-malleable public-key encryption in the standard model, A lattice-based signcryption scheme without random oracles, An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption, Extended dual system group and shorter unbounded hierarchical identity based encryption, Public key encryption with equality test in the standard model, Attribute-based proxy re-encryption from standard lattices, Scalable revocable identity-based signature over lattices in the standard model, Efficient and fully secure lattice-based IBE with equality test, Forward-secure revocable identity-based encryption, Adaptively secure inner product encryption from LWE, Inner-product functional encryption with fine-grained access control, CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors, Lattice-based e-cash, revisited, Receiver selective opening security for identity-based encryption in the multi-challenge setting, ABE for DFA from LWE against bounded collusions, revisited, Ring-based identity based encryption -- asymptotically shorter MPK and tighter security, Updatable public key encryption in the standard model, Vector and functional commitments from lattices, Direct computation of branching programs and its applications to more efficient lattice-based cryptography, Lattice-based identity-based resplittable threshold public key encryption scheme, Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions, Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes, Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security, Augmented Learning with Errors: The Untapped Potential of the Error Term, Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption