Efficient Lattice (H)IBE in the Standard Model
From MaRDI portal
Publication:3563855
DOI10.1007/978-3-642-13190-5_28zbMath1227.94022OpenAlexW2122973102WikidataQ56519030 ScholiaQ56519030MaRDI QIDQ3563855
Shweta Agrawal, Dan Boneh, Xavier Boyen
Publication date: 1 June 2010
Published in: Advances in Cryptology – EUROCRYPT 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-13190-5_28
Related Items (only showing first 100 items - show all)
A Lattice-Based Certificateless Public Key Encryption with Equality Test in Standard Model ⋮ Attribute-Based Keyword Search from Lattices ⋮ Generic Constructions of Revocable Identity-Based Encryption ⋮ Almost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and More ⋮ Isochronous Gaussian Sampling: From Inception to Implementation ⋮ Compact Lossy and All-but-One Trapdoor Functions from Lattice ⋮ Trapdoors for Ideal Lattices with Applications ⋮ Predicate Encryption for Circuits from LWE ⋮ Deniable Attribute Based Encryption for Branching Programs from LWE ⋮ Targeted Homomorphic Attribute-Based Encryption ⋮ Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model ⋮ Towards a Simpler Lattice Gadget Toolkit ⋮ Shorter Lattice-Based Group Signatures via “Almost Free” Encryption and Other Optimizations ⋮ Succinct vector, polynomial, and functional commitments from lattices ⋮ Sender-binding key encapsulation ⋮ Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions ⋮ Towards Tightly Secure Lattice Short Signature and Id-Based Encryption ⋮ Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps ⋮ Unique-path identity based encryption with applications to strongly secure messaging ⋮ Decentralized multi-authority attribute-based inner-product FE: large universe and unbounded ⋮ Lattice-based zero-knowledge proofs and applications: shorter, simpler, and more general ⋮ A new framework for more efficient round-optimal lattice-based (partially) blind signature via trapdoor sampling ⋮ Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs ⋮ On Constructing Pairing-Free Identity-Based Encryptions ⋮ More efficient adaptively secure lattice-based IBE with equality test in the standard model ⋮ Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices ⋮ A note on the post-quantum security of (ring) signatures ⋮ Multi-authority ABE from lattices without random oracles ⋮ Forward-secure encryption with fast forwarding ⋮ Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance ⋮ Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities ⋮ Preimage sampling in the higher-bit approximate setting with a non-spherical Gaussian sampler ⋮ Cumulatively all-lossy-but-one trapdoor functions from standard assumptions ⋮ Identity-based matchmaking encryption from standard assumptions ⋮ (Inner-product) functional encryption with updatable ciphertexts ⋮ A fully secure lattice-based signcryption with designated equality test in standard model ⋮ Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption ⋮ Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding ⋮ A New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusion ⋮ A survey on functional encryption ⋮ Simplified server-aided revocable identity-based encryption from lattices ⋮ Spatial encryption revisited: from delegatable multiple inner product encryption and more ⋮ Public key authenticated encryption with keyword search from LWE ⋮ Lattice-based programmable hash functions and applications ⋮ Quantum search-to-decision reduction for the LWE problem ⋮ Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment ⋮ Identity-Based Blind Signature from Lattices in Standard Model ⋮ Multi-bit Leveled Homomorphic Encryption via $$\mathsf {Dual.LWE}$$ -Based ⋮ Two Efficient Tag-Based Encryption Schemes on Lattices ⋮ Compact Inner Product Encryption from LWE ⋮ Compact Hierarchical IBE from Lattices in the Standard Model ⋮ Simplified Revocable Hierarchical Identity-Based Encryption from Lattices ⋮ Lattice-Based Group Signatures with Verifier-Local Revocation: Achieving Shorter Key-Sizes and Explicit Traceability with Ease ⋮ Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications ⋮ Revocable Identity-Based Encryption Revisited: Security Model and Construction ⋮ Improved (Hierarchical) Inner-Product Encryption from Lattices ⋮ Private Puncturable PRFs from Standard Lattice Assumptions ⋮ Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange ⋮ Watermarking cryptographic functionalities from standard lattice assumptions ⋮ Simple and generic constructions of succinct functional encryption ⋮ Multi-theorem preprocessing NIZKs from lattices ⋮ Generic constructions of integrated PKE and PEKS ⋮ Tighter security proofs for GPV-IBE in the quantum random oracle model ⋮ Novel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard Model ⋮ Algebraic Attacks Against Several Weak Variants of GVW’13 ABE ⋮ Better Key Sizes (and Attacks) for LWE-Based Encryption ⋮ Adaptive oblivious transfer with access control from lattice assumptions ⋮ A Novel Lattice-Based Ciphertext-Policy Attribute-Based Proxy Re-encryption for Cloud Sharing ⋮ The Geometry of Lattice Cryptography ⋮ Algorithms for the Generalized NTRU Equations and their Storage Analysis ⋮ Survey of Lattice-Based Group Signature ⋮ Multi-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input Setting ⋮ Unnamed Item ⋮ Lattice-based linearly homomorphic signature scheme over binary field ⋮ Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance ⋮ 0-RTT Key Exchange with Full Forward Secrecy ⋮ An efficient IBE scheme with tight security reduction in the random oracle model ⋮ Cryptanalysis and improvement of verifiable quantum \((k,n)\) secret sharing ⋮ Lattice-based key exchange on small integer solution problem ⋮ SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions ⋮ Attribute-based signatures from lattices: unbounded attributes and semi-adaptive security ⋮ Adaptively secure distributed PRFs from LWE ⋮ Watermarking PRFs under standard assumptions: public marking and security with extraction queries ⋮ Lattice-based certificateless encryption scheme ⋮ An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption ⋮ Extended dual system group and shorter unbounded hierarchical identity based encryption ⋮ Functional encryption for Turing machines with dynamic bounded collusion from LWE ⋮ Attribute-based access control for inner product functional encryption from LWE ⋮ Attribute-based conditional proxy re-encryption in the standard model under LWE ⋮ Lattice-based HRA-secure attribute-based proxy re-encryption in standard model ⋮ Black-box accumulation based on lattices ⋮ On the higher-bit version of approximate inhomogeneous short integer solution problem ⋮ Faster Gaussian sampling for trapdoor lattices with arbitrary modulus ⋮ Anonymous IBE, leakage resilience and circular security from new assumptions ⋮ Puncturable identity-based and attribute-based encryption from lattices ⋮ Lattice-based public-key encryption with equality test supporting flexible authorization in standard model ⋮ Dynamic collusion bounded functional encryption from identity-based encryption ⋮ Public key encryption with equality test in the standard model ⋮ Attribute-based proxy re-encryption from standard lattices ⋮ Scalable revocable identity-based signature over lattices in the standard model
This page was built for publication: Efficient Lattice (H)IBE in the Standard Model