Efficient Lattice (H)IBE in the Standard Model

From MaRDI portal
Publication:3563855

DOI10.1007/978-3-642-13190-5_28zbMath1227.94022OpenAlexW2122973102WikidataQ56519030 ScholiaQ56519030MaRDI QIDQ3563855

Shweta Agrawal, Dan Boneh, Xavier Boyen

Publication date: 1 June 2010

Published in: Advances in Cryptology – EUROCRYPT 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-13190-5_28




Related Items (only showing first 100 items - show all)

A Lattice-Based Certificateless Public Key Encryption with Equality Test in Standard ModelAttribute-Based Keyword Search from LatticesGeneric Constructions of Revocable Identity-Based EncryptionAlmost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and MoreIsochronous Gaussian Sampling: From Inception to ImplementationCompact Lossy and All-but-One Trapdoor Functions from LatticeTrapdoors for Ideal Lattices with ApplicationsPredicate Encryption for Circuits from LWEDeniable Attribute Based Encryption for Branching Programs from LWETargeted Homomorphic Attribute-Based EncryptionEfficient Code Based Hybrid and Deterministic Encryptions in the Standard ModelTowards a Simpler Lattice Gadget ToolkitShorter Lattice-Based Group Signatures via “Almost Free” Encryption and Other OptimizationsSuccinct vector, polynomial, and functional commitments from latticesSender-binding key encapsulationSignature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice AssumptionsTowards Tightly Secure Lattice Short Signature and Id-Based EncryptionPartitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear MapsUnique-path identity based encryption with applications to strongly secure messagingDecentralized multi-authority attribute-based inner-product FE: large universe and unboundedLattice-based zero-knowledge proofs and applications: shorter, simpler, and more generalA new framework for more efficient round-optimal lattice-based (partially) blind signature via trapdoor samplingRelaxed Lattice-Based Signatures with Short Zero-Knowledge ProofsOn Constructing Pairing-Free Identity-Based EncryptionsMore efficient adaptively secure lattice-based IBE with equality test in the standard modelLeakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from latticesA note on the post-quantum security of (ring) signaturesMulti-authority ABE from lattices without random oraclesForward-secure encryption with fast forwardingRevocable identity-based fully homomorphic signature scheme with signing key exposure resistanceFully collusion resistant trace-and-revoke functional encryption for arbitrary identitiesPreimage sampling in the higher-bit approximate setting with a non-spherical Gaussian samplerCumulatively all-lossy-but-one trapdoor functions from standard assumptionsIdentity-based matchmaking encryption from standard assumptions(Inner-product) functional encryption with updatable ciphertextsA fully secure lattice-based signcryption with designated equality test in standard modelIdentity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear AssumptionLeveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with RoundingA New Insight—Proxy Re-encryption Under LWE with Strong Anti-collusionA survey on functional encryptionSimplified server-aided revocable identity-based encryption from latticesSpatial encryption revisited: from delegatable multiple inner product encryption and morePublic key authenticated encryption with keyword search from LWELattice-based programmable hash functions and applicationsQuantum search-to-decision reduction for the LWE problemLattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud EnvironmentIdentity-Based Blind Signature from Lattices in Standard ModelMulti-bit Leveled Homomorphic Encryption via $$\mathsf {Dual.LWE}$$ -BasedTwo Efficient Tag-Based Encryption Schemes on LatticesCompact Inner Product Encryption from LWECompact Hierarchical IBE from Lattices in the Standard ModelSimplified Revocable Hierarchical Identity-Based Encryption from LatticesLattice-Based Group Signatures with Verifier-Local Revocation: Achieving Shorter Key-Sizes and Explicit Traceability with EaseImproved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and ApplicationsRevocable Identity-Based Encryption Revisited: Security Model and ConstructionImproved (Hierarchical) Inner-Product Encryption from LatticesPrivate Puncturable PRFs from Standard Lattice AssumptionsBloom filter encryption and applications to efficient forward-secret 0-RTT key exchangeWatermarking cryptographic functionalities from standard lattice assumptionsSimple and generic constructions of succinct functional encryptionMulti-theorem preprocessing NIZKs from latticesGeneric constructions of integrated PKE and PEKSTighter security proofs for GPV-IBE in the quantum random oracle modelNovel Identity-Based Hash Proof System with Compact Master Public Key from Lattices in the Standard ModelAlgebraic Attacks Against Several Weak Variants of GVW’13 ABEBetter Key Sizes (and Attacks) for LWE-Based EncryptionAdaptive oblivious transfer with access control from lattice assumptionsA Novel Lattice-Based Ciphertext-Policy Attribute-Based Proxy Re-encryption for Cloud SharingThe Geometry of Lattice CryptographyAlgorithms for the Generalized NTRU Equations and their Storage AnalysisSurvey of Lattice-Based Group SignatureMulti-use Deterministic Public Key Proxy Re-Encryption from Lattices in the Auxiliary-Input SettingUnnamed ItemLattice-based linearly homomorphic signature scheme over binary fieldLattice-based revocable (hierarchical) IBE with decryption key exposure resistance0-RTT Key Exchange with Full Forward SecrecyAn efficient IBE scheme with tight security reduction in the random oracle modelCryptanalysis and improvement of verifiable quantum \((k,n)\) secret sharingLattice-based key exchange on small integer solution problemSO-CCA secure PKE from pairing based all-but-many lossy trapdoor functionsAttribute-based signatures from lattices: unbounded attributes and semi-adaptive securityAdaptively secure distributed PRFs from LWEWatermarking PRFs under standard assumptions: public marking and security with extraction queriesLattice-based certificateless encryption schemeAn efficient CCA-secure cryptosystem over ideal lattices from identity-based encryptionExtended dual system group and shorter unbounded hierarchical identity based encryptionFunctional encryption for Turing machines with dynamic bounded collusion from LWEAttribute-based access control for inner product functional encryption from LWEAttribute-based conditional proxy re-encryption in the standard model under LWELattice-based HRA-secure attribute-based proxy re-encryption in standard modelBlack-box accumulation based on latticesOn the higher-bit version of approximate inhomogeneous short integer solution problemFaster Gaussian sampling for trapdoor lattices with arbitrary modulusAnonymous IBE, leakage resilience and circular security from new assumptionsPuncturable identity-based and attribute-based encryption from latticesLattice-based public-key encryption with equality test supporting flexible authorization in standard modelDynamic collusion bounded functional encryption from identity-based encryptionPublic key encryption with equality test in the standard modelAttribute-based proxy re-encryption from standard latticesScalable revocable identity-based signature over lattices in the standard model




This page was built for publication: Efficient Lattice (H)IBE in the Standard Model