Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE
From MaRDI portal
Publication:3582750
DOI10.1007/978-3-642-14623-7_6zbMath1280.94035OpenAlexW1537360597MaRDI QIDQ3582750
Xavier Boyen, Shweta Agrawal, Dan Boneh
Publication date: 24 August 2010
Published in: Advances in Cryptology – CRYPTO 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-14623-7_6
Related Items (58)
An efficient IBE scheme with tight security reduction in the random oracle model ⋮ Lattice-based key exchange on small integer solution problem ⋮ Lattice-based certificateless encryption scheme ⋮ Extended dual system group and shorter unbounded hierarchical identity based encryption ⋮ Trapdoors for Ideal Lattices with Applications ⋮ Targeted Homomorphic Attribute-Based Encryption ⋮ Faster Gaussian sampling for trapdoor lattices with arbitrary modulus ⋮ Public key encryption with equality test in the standard model ⋮ A unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemes ⋮ Scalable revocable identity-based signature over lattices in the standard model ⋮ Efficient and fully secure lattice-based IBE with equality test ⋮ Forward-secure revocable identity-based encryption ⋮ Augmented Learning with Errors: The Untapped Potential of the Error Term ⋮ Succinct vector, polynomial, and functional commitments from lattices ⋮ Efficient laconic cryptography from learning with errors ⋮ Hardness of \(k\)-LWE and applications in traitor tracing ⋮ A new framework for more efficient round-optimal lattice-based (partially) blind signature via trapdoor sampling ⋮ More efficient adaptively secure lattice-based IBE with equality test in the standard model ⋮ Multi-authority ABE from lattices without random oracles ⋮ Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance ⋮ A framework for practical anonymous credentials from lattices ⋮ Candidate witness encryption from lattice techniques ⋮ Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding ⋮ Forward-secure revocable secret handshakes from lattices ⋮ Lattice-based programmable hash functions and applications ⋮ Relations between semantic security and anonymity in identity-based encryption ⋮ A lattice-based forward secure IBE scheme for Internet of things ⋮ Identity-based key-exposure resilient cloud storage public auditing scheme from lattices ⋮ Hardness of (M)LWE with semi-uniform seeds ⋮ Lattice-based proxy-oriented identity-based encryption with keyword search for cloud storage ⋮ Collusion Resistant Traitor Tracing from Learning with Errors ⋮ A lattice-based identity-based proxy blind signature scheme in the standard model ⋮ Compact Hierarchical IBE from Lattices in the Standard Model ⋮ Simplified Revocable Hierarchical Identity-Based Encryption from Lattices ⋮ Efficient identity-based encryption with hierarchical key-insulation from HIBE ⋮ Strongly secure authenticated key exchange from factoring, codes, and lattices ⋮ Efficient public-key encryption with equality test from lattices ⋮ Identity-based blind signature from lattices ⋮ Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications ⋮ Anonymous HIBE with short ciphertexts: full security in prime order groups ⋮ Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption ⋮ Algebraic Attacks Against Several Weak Variants of GVW’13 ABE ⋮ Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity ⋮ Optimal broadcast encryption from pairings and LWE ⋮ Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}} ⋮ The Geometry of Lattice Cryptography ⋮ Anonymous Encryption with Partial-Order Subset Delegation Functionality ⋮ Exact lattice sampling from non-Gaussian distributions ⋮ Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance ⋮ Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes ⋮ Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security ⋮ Wildcarded identity-based encryption from lattices ⋮ LWE from non-commutative group rings ⋮ Algorithms for the Generalized NTRU Equations and their Storage Analysis ⋮ A new Gaussian sampling for trapdoor lattices with arbitrary modulus ⋮ Unnamed Item ⋮ Implementation of lattice trapdoors on modules and applications ⋮ Key-homomorphic pseudorandom functions from LWE with small modulus
This page was built for publication: Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE